LibreOffice is a free use and open source office software package that has a relatively large number of users. Recently, web application...
The researcher discovered a code execution vulnerability in LibreOffice let an attacker hack your computer by just sending a weaponized document with...
Are you using LibreOffice? You should be extra careful about what document files you open using the LibreOffice software over the next...
The developers of the VLC media player have been involved into a new controversy. Recently, an alleged report by information security audit...
A new vulnerability in NVIDIA Tegra processors exposes multiple cyberattacks to systems that use them, primarily Internet of Things (IoT) devices. According...
The probability that Lenovo has earned the infamous record for becoming a subject of the world’s biggest data breach in history is...
Experts in vulnerability testing discovered a critical flaw in Ad Inserter, a plugin for advertising management on WordPress sites. If exploited, this...
Web application security specialists have reported the finding of a new vulnerability in Apple’s new operating system iOS 13 beta version which,...
Instant messaging apps like WhatsApp and Telegram keep your messages encrypted in transit, but once a media file reaches your phone, the...
The newly discovered ransomware family targets the QNAP network attached storage (NAS) devices. This malicious program, known by security researcher Anomali as...
The chaos and panic that the disclosure of privacy vulnerability in the highly popular and widely-used Zoom video conferencing software created earlier...
Web application security experts reported the presence of a vulnerability in the Apple Watch that, if exploited, allowed threat actors to spy...
In recent days the web application security audit specialist Jonathan Leitschuh revealed the existence of zero-day vulnerability in Zoom, the popular video...
Ever since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the...
As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of...
Researchers discovered several vulnerabilities that affected Lenovo servers/application infrastructure that could have exploited the systems integrity, availability, and confidentiality. Lenovo Group, one...
We’ve often heard about it, but what is a SaaS company? SaaS means “Software as a Service,”so basically, this is an organization...
Microsoft Teams, a platform designed for teamwork management in enterprise environments, contains a vulnerability that, if exploited, would allow any user to...
Bulgarian authorities arrested an IT expert for demonstrating a flaw in the security of the software used by local kindergartens. This vulnerability...
According to information security audit specialists there is a Microsoft Excel feature called Power Query that could be used by threat actors...
Vulnerability analysis specialists have discovered a set of security flaws in the Origin online video game store, developed by Electronic Arts (EA)....