A popular version of the open source Magento ecommerce platform is vulnerable to a zero-day remote code execution vulnerability, putting as many...
King of copy-paste exploits, the Sundown exploit kit, has been offline since March 8, and this also includes most of its variations,...
Same exploit used by malware crooks and nation-sponsored hackers targeting Russians. A critical Microsoft Word zero-day that was actively exploited for months...
SAP has issued an updated patch for a code-injection vulnerability affecting the TREX search engine integrated into more than a dozen SAP...
Microsoft today patched a zero-day Word vulnerability that has been publicly attacked along with deploying fixes for Internet Explorer, Microsoft Edge and...
Earlier today, Adobe has released security patches for several of its applications, including Adobe Flash Player, Adobe Campaign, Adobe Photoshop CC, the...
Riverbed Technology has patched four serious vulnerabilities in its SteelCentral portal, a centralized application performance monitoring platform. The flaws could allow an...
Security researchers from Symantec have tied the CIA hacking tools leaked by WikiLeaks last month to a cyber-espionage group responsible for at...
A particular TP-Link router model will spew out its admin password in cleatext to anyone that sends an SMS message to the...
At McAfee, we have put significant efforts in hunting attacks such as advanced persistent threats and “zero days.” Yesterday, we observed suspicious...
The Shadow Brokers (TSB) are back, and they’ve released the password for the rest of the hacking tools they claim to have...
[jpshare] MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been...
If you follow the steps in the phishing email, you may end up giving attackers a way into stealing your identity. Apple...
The investigation into The Love Zone child pornography site was much larger in scope than previously thought. Last year, Motherboard found Australian...
For more than a month, at least ten groups of attackers have been compromising systems running applications built with Apache Struts and...
Short Bytes: There are good chances that you might’ve heard about Samsung’s Android replacement Tizen OS. Recently, an Israeli researcher uncovered 40 zero-days in...
Hackers are using a combination of low and high-tech attacks to make ATMS spit out cash, according to Kaspersky researcher Igor Soumenkov,...
Owners of Android and iOS devices should pay special attention to security updates released by Google and Apple on Monday, as they...
Experts at Cylance disclosed two UEFI flaws that can be exploited by attackers to install a backdoor on some Gigabyte BRIX mini...
The Internet of Shit gets up close and personal. If you’re using an internet-connected vibrator equipped with a camera that allows you...
A series of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or business credentials....