Cisco recently issued a security alert for all companies using the Zoom Connector, mentioning that this driver could be used maliciously. According...
Newly discovered Android vulnerability dubbed “StrandHogg” being exploited in wide by unknown hackers using weaponized malware apps that posed as a legitimate...
Vulnerability testing specialists reported the finding of a security flaw in phpMyAdmin, one of the world’s most widely used MySQL database management...
Again, new reports of security flaws that could affect the millions of WordPress users, the most popular content management system (CMS), have...
According to digital forensics specialists at security firm Applied Risk there are more than 100 vulnerabilities in multiple building management systems (BMS)...
Highly useful and practical as they are, wireless routers can cost us a lot if we fail to secure them properly. It...
An animal abuse website or otherwise called a “bestiality” platform (whose name will not be shared here as it is not appropriate)...
Although people buy video camera doorbells from Ring manufacturer hoping to increase the security of their homes, a flaw in the software...
So, you run the publication’s website or maintain your own blog. You publish what you think is necessary, and someone may not like it. Potentially, your blog is...
A couple of days ago, vulnerability testing specialists reported the detection of CVE-2019-11043, a dangerous remote code execution vulnerability that can affect...
Web application security specialists report the finding of a security vulnerability in the PHP programming language. This is one of the most...
A new recently patched remote code execution bug in PHP7 lets hackers hijack the websites running on some NGINX and php-fpm configurations....
NFC expanded as Near Field Communication, contains a set of protocols that allows Android devices to establish communication at a very shortest...
Vulnerability testing specialists report the finding of a new security flaw across multiple versions of Android OS (full report here). By default,...
CPDoS can be used to attack content delivery networks (CDNs) to serve error pages instead of legitimate sites through caching. Freshly termed...
A recent investigation by vulnerability testing specialists at security firm SafeBreach Labs has revealed the presence of a critical vulnerability in the...
A new security flaw has caught the attention of vulnerability testing experts. A recently published report mentions that a severe vulnerability in...
A report by vulnerability testing experts states that a relatively old WiFi vulnerability affects millions of Amazon Echo and Kindle devices from...
A recently revealed report has concerned Linux users. Vulnerability testing specialists have revealed a new security flaw in Sudo, one of the...
“Sudoing” lately? Linux or any Unix-based platform users are well aware of the Sudo command. In Unix and Linux, the Sudo keyword...
A new vulnerability has been discovered in the Linux Sudo program let unprivileged users can run the command as root by specifying...