Canonical announced a few hours ago the availability of new kernel updates for all supported Ubuntu Linux operating systems, patching a total...
Recently ,there have been some serious vulnerabilities found in various Linux systems. Whilst OS vulnerabilities are a common occurrence. The ‘Dirty Cow’...
WordPress 4.7.1 and earlier forms are influenced by various vulnerabilities. A remote attacker could exploit some of these vulnerabilities to take control...
What’s interesting when I come across a new piece of software is how the initial impressions change after reading the code. If...
Only a local hacker in a facility would be able to run an attack. General Electric (GE) has pushed out an update...
According to the release notes the latest version of WordPress 4.7.1 addresses eight security vulnerabilities and other 62 bugs. Wednesday the latest...
The security expert Dawid Golunski from Legal Hackers has reported critical RCE flaws in the popular PHP libraries SwiftMailer, PhpMailer and ZendMail....
Microsoft today patched a half-dozen critical browser vulnerabilities that have been publicly disclosed, but apparently not used in attacks as of yet....
Nagios Core has been updated to take care of two critical vulnerabilities that can be pinned together to attack servers hosting the...
McAfee patches flaws in its Linux security solution. Remote code execution flaws found in McAfee VirusScan Enterprise for Linux could allow an...
Security experts who conducted an audit on cURL discovered nearly a dozen vulnerabilities that were patched in the last release. The cURL...
Critical vulnerabilities in MySQL and vendor deployments by database servers MariaDB and PerconaDB have been identified that can lead to arbitrary code...
The security of IoT devices is the problem the world is sure to face in the coming years. To make it easy...
Hi there my fellow hackers, we are back with another tutorial. Today we will see how we can use a Nmap script...
Following an investigation by Pen Test Partners, British Telecom (BT) has released a firmware upgrade for their popular range of Wi-Fi extenders....
News of software vulnerabilities often centers on products from well-known companies that potentially put large numbers of end users at risk. But...
Welcome back guys. Today we will see how you can check for vulnerabilities using Nessus. Usually vulnerability scans are done before doing the penetration...
Short Bytes: Canonical has released a new update for Ubuntu 16.04 LTS operating system, its official flavors, and derivates. This update covers...
Obihai Technology recently patched vulnerabilities in its ObiPhone IP phones that could have led to memory corruption, buffer overflow, and denial of service...
The BHU WiFi uRouter, manufactured and sold in China, looks great – and it contains multiple critical vulnerabilities. An unauthenticated attacker could...
The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of HP (Hewlett Packard) and decided to explain concepts of...