Researchers from the Silesian University of Technology in Poland discovered several flaws that could be exploited to take control over some models...
What is SSRF vulnerability? Server Side Request Forgery (SSRF) is a type of vulnerability class where attacker sends crafted request from a...
The company has released security updates to address the serious vulnerabilities that affect its operating system This week, Juniper Networks has launched...
The flaw was found while experts analyzed the user-side security of dating apps A team of forensic experts set out to conduct...
Microsoft released security update under patch Tuesday that affected many of its products along with certain critical Windows zero-day flaw. There are...
Mozilla Firefox Released security updates that cover 2 critical vulnerabilities in Firefox 62.0.3 and Firefox ESR 60.2.2. One of the remote code execution...
Lenovo has launched an alert for nine “high-risk” rated vulnerabilities that impact 20 network attached storage devices (NAS) sold by the company,...
According to experts vulnerability sales have been all but driven off the dark web, which now operates in the open. For years...
This tool connects PCs within organizations to industrial control systems Experts in ethical hacking discovered various vulnerabilities in Fuji Electric V-Server, a...
The flaws could allow code execution Ethical hacking specialists have recently published a vulnerability report jointly with the enterprise systems monitoring software provider Opsview. The...
As revealed by Tech Crunch, the UK-based telecommunication firm EE, endured recurrent flaws in its online system. In one week, EE fixed...
Tplmap is a python tool that can find code injection and Server Side Templates Injection (SSTI) vulnerabilities by using sandbox escape techniques....
Adobe has released its latest security patches that would help fix the multiple critical vulnerabilities that have been detected in Adobe Photoshop...
Advanced hacking skills are not necessary to exploit the flaw Several remote code execution vulnerabilities have been found on Philips devices designed...
Trend Micro is introducing a new update on how its software implements automatic updates, they dubbed it “Virtual Patching”. It is designed...
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By providing a target website to the tool,...
A considerable amount of the vulnerabilities revealed are considered as critical flaws A cyber security organization report shows that 16.6% of the vulnerabilities reported in the...
Your new phone could be remotely hacked Almost all phones that operate with Android include apps pre-installed by manufacturers or operators, known...
At Defcon 2018, ex-NSA staffer and a popular Mac hacker Patrick Wardle presented his research work which involved bypassing the layers of...
There are bugs in lots of points of sale that compromise mobile payment systems Several vulnerabilities in the mobile point of sale devices (mPOS)...
Researchers have discovered countless zero-day vulnerabilities that can be used to disrupt critical systems Experts in enterprise network security from the International...