An ethical hacker from the International Institute of Cyber Security reports the discovery of critical security vulnerability in TCPDF, one of the...
A malicious code has infected Event-stream JavaScript library with the intention of stealing cryptocurrency from digital wallets. The popular JavaScript library is...
Event-stream Node.js module called is used in millions of web applications, including BitPay’s open-source bitcoin wallet, Copay. This module was reportedly compromised thanks to the...
The team behind Apache Struts has strongly requested users to install the necessary updates to mitigate the risks generated by an old...
This library is used by popular media players, along with a series of integrated devices with streaming capacities Cybersecurity and digital forensics...
Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players,...
This article has been updated with a statement from Live Networks, Inc explaining that the flaw only affected their implementation of RTSP server,...
SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use...
Recently we saw an attempt to hide a back door in a code library, and today there is a new case. This...
PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly...
The official blog of jQuery—most popular JavaScript library used by millions of websites—has been hacked by some unknown hackers, using the pseudonym...
Fast and powerful SSL/TLS server scanning library for Python 2.7 and 3.3+. Description SSLyze is a Python library and a CLI tool...
A vulnerability codenamed Devil’s Ivy is putting thousands of Internet-connected devices at risk of hacking. Discovered by security researchers from Senrio, the...
The simple line of code made it possible for attackers to view private Yahoo Mail images. Yahoo has decided to retire the...
Tutorials on Windows DLL injections in C have noticable gaps in what they explain. This blog post plus the comments on my...
Short Bytes: FAISS is an open-source library released by Facebook for similarity search and clustering high-dimensional data. This library finds application in...
If you were trying to use the public computers at St Louis Public Library this week you may have experienced more than...
Litesploit is a library and intepreter for penetration testing tools. This includes exploits, tools and litepreter. Litesploit support for Linux like ubuntu...
The online hacktivist Anonymous breached into the subdomain of the National Agriculture Library (NAL) and leaked personal details of staff and other...
Since Edward Snowden exposed the extent of online surveillance by the US government, there has been a surge of initiatives to protect...
People who are using a different telephone apps on their cell phones need to be cautious, as a researcher has indicated vulnerabilities...