A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to…
Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches…
Facebook announced that the number of its users accessing through the Tor network has passed 1 million. The number is…
Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering…
The native Windows command-line utility Regsvr32 can be exploited to bypass MS Applocker and run remote code bypassing protection mechanisms.…
The security expert Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records.…
Facebook hacked! The security expert Orange Tsai discovered the presence of a malicious webshell on one of the company servers.…
FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to…
A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…
State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…
This website uses cookies.