Cyber vulnerability hoarding? The US government publishes its Vulnerabilities Equities Policy (VEP) and describes the process by which cyber flaws found by...
The general perception of the public is that Linux and macOS operating systems are far more secure as compared to Windows. While...
Experts discovered flaws in IEEE P1735 electronics standard, which describes methods for encrypting electronic-design intellectual property (IP). Crypto flaws in the IEEE P1735 electronics standard expose highly-valuable...
A flaw in the Google Issue Tracker, also known as the “Buganizer,” might have exposed details about unpatched flaws listed in the...
One stop tool for auditing the security posture of AWS. Pre-requisites Python 2.7 pip git Installation git clone https://github.com/SecurityFTW/cs-suite.git cd cs-suite/ sudo...
Siemens has released a firmware update that addresses two vulnerabilities in its BACnet Field Panel building automation controllers. This week Siemens has...
AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. It’s similar to a subdomain bruteforcer but is...
Security researchers have discovered not one or two, but a total of seven security vulnerabilities in the popular open source Dnsmasq network...
Cisco has released security updates for its IOS Operating System to fix more than a dozen critical and high severity vulnerabilities. Cisco...
The security researcher Chris Vickery discovered that Media giant Viacom left sensitive data and secret access key on unsecured Amazon AWS S3 bucket....
Usually, a bug bounty program helps companies secure their software and products from zero day vulnerabilities that can cause massive damage if cyber...
Microsoft Releases Patch for Dangerous .NET Vulnerability in Latest Security Updates. Microsoft has finally patched a vulnerability in Microsoft Windows that was...
There are several websites allowing users to download YouTube videos such as odownloader but in 2016, Youtube-mp3.org (YTMP3), a popular YouTube-ripping site...
Are you using Foxit PDF Reader? If so, then you need to look back. Security researchers discovered two critical security vulnerabilities Zero...
Defcon is the most important event for the DIY hacking community and this year too, the conference was held in the same...
Three security researchers have discovered security vulnerabilities in the telematics control units (TCUs) used in BMW, Ford, Infiniti, and Nissan vehicles. Three...
Two US security researchers have found vulnerabilities in smart car wash solutions sold by PDQ, a US-based vendor of Internet-connected car wash...
Apple Inc. will soon be storing cloud data of its Chinese customers with a Chinese government-owned company in accordance with the latest...
Security researchers at behavioral firewall specialist firm Preempt have discovered two critical security flaws in the Microsoft Windows NT LAN Manager (NTLM)...
It was last year when, John McAfee, the co-founder of an antivirus company that’s now owned by Intel, took Intel to the...
Russia threatens to ban the Telegram instant messaging app because the company refused to be compliant with the country’s new data protection...