Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux,...
Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and...
A team of researchers has disclosed their findings at the NDSS (Network and Distributed System Security) symposium 2019 held in San Diego,...
Spectre and Meltdown attacks were initially discovered in early 2018. Following which, many security researchers have tried and tested different methods to...
Password Managers aren’t as secure as you might assume – Security researchers claim that hackers can steal master passwords in PC memory....
After 18 months of an investigation against Facebook, probing the social media platform’s privacy practice, the UK government has published a detailed...
Microsoft has issued its second Patch Tuesday for this year to address a total of 77 CVE-listed security vulnerabilities in its Windows...
Major Security Flaws Identified in RDP Protocols making Machines Prone to Remote Code Execution and Reverse RDP Attacks. Check Point researchers have...
You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security...
Hungary’s Prosecution Service has accused an ethical hacker and computer specialist of infiltrating the Magyar Telekom database. The office found him involved...
Just yesterday, we reported the massive Facetime bug in iOS 12.1 devices that allowed people to eavesdrop a conversation, even before the recipient picks up a call....
A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world’s most popular and widely-used web hosting companies...
Check Point researchers have discovered multiple security vulnerabilities in Fortnite, a massively popular online battle game, one of which could have allowed...
A set of 36-year-old vulnerabilities has been uncovered in the Secure Copy Protocol (SCP) implementation of many client applications that can be...
Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could...
I hope you had biggest, happiest and craziest New Year celebration, but now it’s time to come back at work and immediately...
The Indian Government has suggested that amendments to the Information Technology (IT) Act should be made to curb the spreading of fake...
Adobe is closing out this year with its December Patch Tuesday update to address a massive number of security vulnerabilities for just...
This is why you should always think twice before opening innocent looking email attachments, especially word and pdf files. Cybersecurity researchers at...
Pacu is an open source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security...
According to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data...