An attacker could find any device, infect it and make it part of a botnet A critical vulnerability present in a Huawei...
A new remote code execution flaw affects the Microsoft browser Cybersecurity experts from the International Institute of Cyber Security report that Microsoft...
This software is used by thousands of organizations in the world Digital forensics specialists from the International Cyber Security Institute report the...
The flaw would have allowed an attacker to generate a new password A Ukrainian digital forensics expert known as Artem Mokowsky reported...
Multiple update patches are coming Sysadmins will work overtime over the next holidays. According to digital forensics specialists from the International Institute...
Admins of thousands of websites are waiting for the update launching According to reports of specialists in digital forensics from the...
An investigation shows that AKA protocol is still vulnerable A communications protocol, originally intended to protect the privacy of mobile phone users,...
Various Linux distributions might be affected by this new vulnerability Digital forensics experts from the International Institute of Cyber Security report...
An attacker could spoof messages, hijack screen controls, or expel other conference attendants A considered critical vulnerability in the Zoom videoconferencing application...
Developers insist that existing defenses will be enough to contain attacks, but experts disagree Information security and digital forensic investigators have discovered...
A team of Researchers discovered 7 New Meltdown and Spectre Level attacks called a sound and extensible systematization of transient execution which...
This bug would have allowed the massive collection of the social network users’ data Facebook cybersecurity and digital forensics teams have detected...
The company recommends users to update their systems as soon as possible, because among the errors found there are zero-day vulnerabilities Last...
A Russian exploit developer publicly revealed the security flaw An expert in cybersecurity and digital forensics and exploits developer from Russia has publicly disclosed...
Security bugs could expose details about drone owners Researchers at a cybersecurity and digital forensics firm identified a couple vulnerabilities in the...
A flaw in how WordPress handles privileges can be exploited to take control of a domain A flaw in the WordPress process to...
This is the third computer error-reporting rewards program launched by the US Armed forces The United States Air Force launched its third...
Using a smart combination of different tools, Kamerka can take an address, a cue point or coordinates and show exposed cameras connected...
Master passwords and flawed standards implementations allow attackers to access encrypted data without having to know the user’s password Researchers in digital...
The streaming server Icecast is affected by a flaw that could be exploited by an attacker to interrupt the transmission of Internet...
The flaw, known as BleedingBit, affects wireless networks used in a large percentage of companies worldwide Two zero-day vulnerabilities present in the...