Web application security specialists report the discovery of a critical vulnerability in a Check Point software solution that, if exploited, would allow...
New cryptographic vulnerability in Tesla Model S key fob’s encryption allows hackers to clone the key and steal the car without touching...
If you are a user of a Lenovo laptop you may need to uninstall the Lenovo Solution Center tool, as a team...
A group of vulnerability testing researchers has revealed a new method to break Bluetooth’s encryption key negotiation protocol; the attack, dubbed ‘Key...
The RubyGems package repository maintenance team recently announced the removal of at least 18 malicious versions of 11 Ruby libraries due to...
Zero-day vulnerability in the Steam online gaming platform client has been revealed. According to the ethical hacking researcher who discovered the flaw,...
During the most recent months, multiple security flaws have been detected in the VLC Media Player, which have been reported in a...
Thanks to some reports of service failures of the popular streaming platform Netflix, a group of vulnerability testing specialists has detected multiple...
According to Microsoft, unprotected servers can spread viruses and malware over the network without the user’s interaction. Microsoft is warning users to...
Wireless protocols are not exempt from cybersecurity risks. IT security audit specialists say that more than one billion Bluetooth-enabled devices (smartphones, IoT...
Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are...
We are covering ransomware and the latest “innovations” to improve it at the expense of the poor victims since 2017. They are...
The implementation of cloud-based architecture has been promoted as a much more secure alternative than traditional networks, mentioning experts in vulnerability testing....
Security issues keep popping up for British Airways. Network security experts have revealed a flaw in the airline’s e-ticketing system that, if...
A team of ethical hacking specialists from Eclypsium security firm has revealed a report describing a critical vulnerability present in the design...
Vulnerability testing specialists have revealed a security vulnerability that affects all Windows operating system computers running on Intel and AMD 64-bit processors....
The same team of cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as Dragonblood, in the newly launched WPA3 WiFi security...
A critical remote code execution vulnerability that resides in the DHCP client allows attackers to take control of the system by sending...
Currently it is no longer uncommon to hear about cases where technology companies intentionally omit the security issues present in their products...
The network technology company, Cisco is set to pay a settlement agreement worth $8.6 million for an alleged violation of the U.S....
It is like being hit by a bullet that we never saw coming our way. That is how we at hackercombat.com describe...