Researchers have detected a new zero-day bug which uses a previously unknown flaw in Microsoft Word. The bug allows attackers to send malicious document...
For more than a month, at least ten groups of attackers have been compromising systems running applications built with Apache Struts and...
It’s a well understood fact that platform security is an integral part of the security of complex systems. For mobile devices, this...
Last year Google found some critical security flaws in Microsoft’s Edge browser and urged the company to fix these flaws within nine...
Samsung’s Secure Bootloader (S-Boot) for Android lies at the heart of Samsung’s chain of trust concept. An attacker who compromises S-Boot could...
WordPress vulnerabilities which were discovered recently have been negatively and sometimes fatally affecting countless websites thus far. Initially, there were three flaws...
A group of researchers from the University Alliance Ruhr has found a cross-site printing bug in the old PostScript language. Popular printer models...
I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of...
There is a fresh ransomware campaign circulating on the web that is spreading Cerber ransomware. This campaign is quite dangerous because it...
The exploitation of the CrashDB code injection issue could allow an attacker to remotely execute arbitrary code on machines running Ubuntu Linux...
A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on...
As technology matures and microprocessors are becoming cheap we are starting to see a trend of products that are now ?smart.? The...
The security expert Issam Rabhi (@issam_rabhi) has discovered a cross-site scripting vulnerability in Google France. The giant already fixed it. A security...
Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shownhow to discover and...
On June 1st, I reported an arbitrary recursion bug in the Linux kernel that can be triggered by a local user on...
Mitsubishi’s Outlander Hybrid Car’s Alarm Vulnerable to Hack due to Wi-Fi access point issue Researcher and security expert Ken Munro has revealed...
Matías Porolli shows how exploit another classic buffer overflow vulnerability, in which the ebp register is moved to execute an arbitrary code.
We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS...
With the rise of inexpensive Virtual Servers and popular services that install insecurely by default, coupled with some juicy vulnerabilities, like CVE-2015-5377...
PowerView is a PowerShell tool to achieve network information on Windows domains for cyber security services and ethical hacking training professionals. It...
A silver Jaguar XFR parked in a parking lot in Auckland, New Zealand was stolen with the help of a hacking device that sends...