Check Point researchers have discovered multiple security vulnerabilities in Fortnite, a massively popular online battle game, one of which could have allowed...
The official Fortnite account of the Canadian rapper Drake going by the handle of “Duddus647” was hacked in an attack on Thanksgiving weekend. The hacker used...
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
What is Subdomain Takeover? Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted....
Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are...
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
Subover is a Hostile Subdomain Takeover tool originally written in python but rewritten from scratch in Golang. Since it’s redesign, it has...
A team of information security experts tells us that sub-domain acquisition vulnerabilities happen whenever a subdomain points to a service (for example,...
Researcher Identifies Emergency Alert Systems Vulnerable to Exploitation Due to SirenJack Flaw – Critical Military and State Infrastructure at Risk of Attacks by Malicious Hackers. ...
subjack is a Hostile Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that...
According to a report submitted by the security company called F-Secure, the security cameras made by a Foscam company from China have some...
A new Cyber Attack Spreading through Vulnerable Subtitles which Downloaded by Victims Media Player and threatens more than 200 Millions of vulnerable...
Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle...
A security researcher named “Michael Reizelman” privately disclosed a serious vulnerability in Flickr and earned a bounty of $7,000 in the process. A...
Facebook quickly resolved a vulnerability in its Business Manager tool late last month that could have let an attacker take over any Facebook page....
Lenovo Solution Center allowed attackers to get admin access. Lenovo has hid a crucial security update in an old security advisory from last...
ShortRead: A suspicious email sent to Outlook users can control user’s system, though, Microsoft has introduced a patch for the issue but...
Google has been busy removing a number of apps from Google Play that are disguised as popular selections that are actually pushing...
The on-plane Wireless systems can easily be hacked by compromising the websites visited by travelers — This happens if same routers/wiring is...
Even after almost a year, Facebook apparently has failed to fix a bug that lets attackers hijack accounts on sites that leverage...