Hacking

Attackers can hack CISCO TelePresence boxes with an HTTP request

Cisco Systems has found and fixed a critical vulnerability tied to its CISCO TelePresence hardware that allowed attackers to access…

10 years ago

272 Million login credentials found in the criminal underground

Hundreds of millions of hacked login credentials for email accounts and other websites are available in the Russian criminal underworld.…

10 years ago

The Infy malware, a long running threat from Iran

Researchers at Palo Alto Networks have come across a new threat used by alleged Iran-linked Hackers in attacks since 2007.…

10 years ago

Google fixes 40 Critical and High Severity flaws in Android

Patches for 40 high and medium severity vulnerabilities have been included in Google’s May 2016 security update for the Android…

10 years ago

Qatar National Bank Declares Systems ‘Fully Secure’ Sequel To Cyber-attack

Following the recent security breach suffered by the Qatar National Bank has assured that its systems are "fully secure". Sequel…

10 years ago

Hackers can exploit flaws in Samsung Smart Home to access your house

Security researchers have discovered multiple flaws in the Samsung Smart Home automation system that could be exploited by remote attackers.…

10 years ago

Garage4hackers Webcast – Bypass Modern WAF’s Exemplified at XSS

Watch now and learn to Bypass Modern WAF's Exemplified at XSS in another Series of Garage4hackers Ranchoddas Webcast. Garage4hackers presents…

10 years ago

The British GCHQ has disclosed dozens vulnerabilities this year

The CESG is considered the Information Security Arm of GCHQ, it has disclosed more than 20 vulnerabilities affecting multiple software…

10 years ago

Did you buy on AlphaBay?Someone may have accessed your info

A security vulnerability in AlphaBay, one the most popular black markets, could expose private messages and data of its users.…

10 years ago

Analyzing Cyber Capabilities of the ISIS

The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group.…

10 years ago

This website uses cookies.