WikiLeaks released a new batch of documents that detail the CIA tool OutlawCountry used to remotely spy on computers running Linux operating…
Experts at CISCO discovered severe remote code execution vulnerabilities in Cisco IOS Software while conducting internal testing. Cisco warned users of…
Ukraine secret service announces joint investigation with Europol, FBI, and NCA to attribute the recent Notpetya massive attack. While security…
The Music streaming service 8tracks suffered a major data leak, 18 million user accounts have been exposed and is available…
Microsoft is warning sysadmins to check their Azure Active Directory Connect installs and patch them against an important Privilege Escalation…
According to the researchers, the Petya variant (NotPetya) used in the massive attack is a wiper disguised by a ransomware.…
Shadow Brokers has sent out the first round of exploits to the subscribers of its service, the hackers also threaten…
A remote attacker can trigger the buffer overflow vulnerability to execute malicious code on affected Linux systems with just a malicious…
WikiLeaks published the manual of the ELSA malware, a tool allegedly used by the U.S. CIA to track people’s locations…
The security expert Benjamin Kunz-Mejri from security firm Vulnerability Lab discovered a remote zero-day stack buffer overflow vulnerability in Skype.…
This website uses cookies.