A few days ago, a new Internet Explorer zero-day vulnerability was reported, which, if exploited, could allow an attacker to extract information...
As Microsoft is gearing up with a new version of Microsoft Edge based-on Chromium engine, Internet Explorer, its ugly step-mother remains as...
Cyber forensics course experts from the International Institute of Cyber Security (IICS) report that Apache Software Foundation (ASF) is launching new versions...
Internet Explorer is not exactly the most popular search engine, and this new security incident definitively won’t help. According to cyber forensics...
Internet Explorer was already useless for most of us, but now it is dangerous to have the obsolete browser on your computer. A security researcher,...
According to cyber forensics course specialists from the International Institute of Cyber Security (IICS), Juniper Networks has launched an unexpected update after...
Mailgun’s WordPress website has been hit by a spray-and-pray hacking campaign, as part of the massive attack on WordPress websites. Mailgun, email...
Two models of TP-Link routers are exposed to the exploitation of a zero day vulnerability that allows malicious users to take control...
Specialists from the International Institute of Cyber Security (IICS), the best ethical hacking institute, reported the emergence of a critical vulnerability in...
Popular UI framework Bootstrap-Sass hosted malicious code in its library that provides an attacker to perform a remote code execution, the affected...
A vulnerability in Xiaomi Mi Pre-Installed Security App ‘Guard Provider’ exposes more than 150,000 devices to an attack. Security researchers from Checkpoint...
According to experts from the International Institute of Cyber Security (IICS), the best ethical hacking institute, the Chinese company Xiaomi has corrected...
Georgia Tech (The Georgia Institute of Technology) has announced detection of a data breach that impacted 1.3 million people. A Georgia Tech...
Portswigger launched Web Security Academy, a free new learning source that covers techniques and methods for exploiting the bugs and how to...
Magento, an Adobe-owned platform, announced the launching of an update patch to correct some critical SQL injection vulnerabilities; according to the authors...
According to the experts from the International Institute of Cyber Security (IICS), the best ethical hacking institute, critical privilege escalation vulnerability in...
Firefox 66.0.1 Released with Fix for Critical Security Vulnerabilities that discovered via Trend Micro’s Zero Day Initiative. The vulnerability affects all the...
Defibrillators are electronic devices manufactured to save the lives of people with life-threatening heart conditions such as Hypertrophic Cardiomyopathy (HCM). But now,...
On March 12th, at around 2:30 a.m., residents of two Texas towns panicked after hearing tornado alarm that went off until 4:00...
GHIDRA is NSA’s reverse engineering tool released earlier this month. Earlier this month, Hackread.com posted about the National Security Agency’s (NSA) publicly releasing...
A vulnerability exists with the web version of Google photos allows malicious websites to extract the photos metadata information. Google photos will...