The WP Database Reset WordPress plugin is affected by an "easily exploitable" vulnerability that can allow attackers to take over vulnerable…
Researchers from Cisco Talos discovered a new Trojan named JhoneRAT that was used in targeted attacks against entities in the…
The availability online of a new collection of Telnet credentials for more than 500,000 servers, routers, and IoT devices made…
A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Google removed 1.7K+…
Attacks on Citrix servers are intensifying, one of the threat actors behind them is patching them and installing its own…
Microsoft published a security advisory to warn of an Internet Explorer (IE) zero-day vulnerability (CVE-2020-0674) that is currently being exploited…
Turkish hackers hijacked for more than 1 hour the official websites of the Greek parliament, some ministries, as well as…
I'm preparing the slides for my next speech and I decided to create this post while searching for interesting cybercrime…
Hack the Army bug bounty program results: 146 valid vulnerabilities were reported by white hat hackers and more than $275,000…
Chinese authorities continue operations against unauthorized VPN services that are very popular in the country. China continues to intensify the…
This website uses cookies.