Wolfgang Ettlinger of SEC Consult Vulnerability Lab, information security expert, found vulnerability in Oracle Access Manager that can be exploited remotely to bypass authentication...
Update: Now VPN Mentor has been released a user-friendly patch for affected users who can provide their WebUI URL of the router and...
A small but unspecified number of GitHub staff could have seen plaintext passwords. GitHub has said a bug exposed some user passwords...
Recently a Dutch information security company has discovered that vehicle infotainment systems (IVI) implemented in some Volkswagen Group car models are vulnerable...
Almost a year ago, on May 4, 2017, information security researcher privately discovered and reported a spoofing vulnerability of the recipient in...
For the most part, SAP implementations continue to be affected by vulnerability in the security configuration initially documented in 2005, information security...
The Drupal security team has fixed another Drupal remote code execution vulnerability, which suggests users to implement the updates offered immediately as...
An information security expert explains that Grouper is an unstable PowerShell module designed for use by pentesters and redteamers that filters the XML output...
So far, researchers have uncovered how web trackers exfiltrate identifying information from web pages, browser password managers, and form inputs. Now, the...
Private profile data, like phone numbers and email addresses, could have been easily collected. According to information security experts, the flaw was found in...
Cisco has issued a critical patch to fix a serious vulnerability (CVE-2018-0112) in its WebEx software that could be exploited by remote...
Drupal beside some things is also an open-source content management system (CMS) just like WordPress and is used by over a million...
This injection technique allows the injected code to run before the entry point of the main thread of the process, thereby allowing...
Intel has addressed vulnerability in the configuration of several CPU series that allow an attacker to alter the behavior of the chip’s...
Just because Android tells you it’s patched and everything is safe doesn’t mean it is. But there’s an app to help you...
JSHielder is an Open Source tool developed to help SysAdmin and developers secure their Linux Servers in which they will be deploying...
Most people rely on Outlook email address for work-related as well as personal tasks. Unfortunately, Outlook may not be as secure as...
A 17 Years old Hacker who inspired by Edward Snowden discovered a critical vulnerability in Signal app that allows anyone to Bypass...
Let’s say that your internet connection suddenly went down or, perhaps, you cannot reach your favorite website. There’s a reason for that;...
Biggest Hackers Group Performing Massive Cyber attack against internet service providers, data centers around the world by compromising Cisco switches. Hackers compromising more than 200,000...
Intel won’t fix Meltdown nor Spectre for 10 product families covering 230-plus CPUs. Intel has issued new “microcode revision guidance” that reveals...