Every website that uses jQuery Mobile, and has any open redirect anywhere is vulnerable to cross-site scripting (XSS) attacks. The jQuery Foundation’s...
A new ransomware called DynA-Crypt was discovered by GData malware analyst Karsten Hahn that not only encrypts your data, but also tries to steal a...
In this blog post I disclose two vulnerabilities in the OnePlus 3/3T bootloader. The first one, CVE-2017-5626, is a critical severity vulnerability...
The online game platform Steam is fixing a serious bug that could be exploited to redirect users to malicious websites and take...
Attackers didn’t wait long to capitalize on laggards slow in updating their WordPress sites to patch a critical content injection vulnerability addressed...
Once the province of nation-sponsored hackers, in-memory malware goes mainstream. Two years ago, researchers at Moscow-based Kaspersky Lab discovered their corporate network...
A sample of a potentially new ransomware called Erebus has been discovered by MalwareHunterTeam on VirusTotal. I say that this is a potentially...
Short Bytes: A security researcher, who goes by the username lgandx, reported a severe vulnerability affecting Windows versions ranging from Windows XP to...
Massive log file includes user complaints, apparently legitimate developer requests. The developers at Denuvo have been in the news thanks to cracks against...
Canonical announced a few hours ago the availability of new kernel updates for all supported Ubuntu Linux operating systems, patching a total...
Remote unauthenticated control over a vulnerable ISP’s gear, could allow an attacker to log into the software as an administrator and remotely...
Vulnerability had been known for nearly a year, flared up shortly after inauguration. A certain model of Low Power FM radio transmitter...
The Metasploit hacking toolkit now includes a new hardware bridge that makes it easier for users to analyze hardware devices. The popular...
The WordPress security team revealed that they’ve secretly fixed a zero-day vulnerability in the WordPress CMS REST API.The vulnerability in this case...
As part of a vulnerability research project for our Sucuri Firewall (WAF), we have been auditing multiple open source projects looking for...
Downloading and trying to open Windows DRM-protected files can deanonymize Tor Browser users and reveal their real IP addresses, security researchers from...
The Pentagon has known about the problem for 8 months. The U.S. Department of Defense could be at risk of being attacked...
Ubuntu users are being urged to update their operating systems to address a handful of recently patched OpenSSL vulnerabilities which affect Ubuntu and its...
Zimperium, the mobile security company that discovered the Stagefright bug in the summer of 2015, announced yesterday its intention to buy fully-working...
A group of researchers from the University Alliance Ruhr has found a cross-site printing bug in the old PostScript language. Popular printer models...
Recently ,there have been some serious vulnerabilities found in various Linux systems. Whilst OS vulnerabilities are a common occurrence. The ‘Dirty Cow’...