The IT security researchers at TrustWave have discovered critical zero-day vulnerabilities in video conferencing products developed by Lifesize which, if exploited by attackers can...
This privilege escalation flaw would allow a remote attacker to impersonate an administrator Microsoft has confirmed the existence of privilege escalation vulnerability...
Microsoft Office for decades has been mocked for being a bloatware office suite and a favorite target of exploits and hacks for...
According to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is likely to see...
The legacy-dependence of the financial sector is very evident, many banks are still using legacy hardware and software to perform their day-to-day...
An attacker could intercept communication metadata to locate of a mobile phone Network security and ethical hacking specialists reported the discovery of...
The international coordination center for vulnerability disclosures has alerted about this critical error The CERT Coordination Center (CERT/CC) has launched a vulnerability...
A malicious user could perform a Man-in-The-Middle attack to extract user’s sensitive information Network security and ethical hacking specialists from the International...
APT, one of the major Linux software installation programs, presents a serious security flaw Users willing to install programs in Linux distributions...
A combination of two exploits allows attackers to install malicious code on IPhone X devices A network security researcher from China has...
An attacker could run a malicious MySQL server and gain access to the connected data, as reported in a security message MySQL...
A specialist recently published the findings of his research According to experts in network security and ethical hacking from the International Institute...
A default configuration grants full admin-level access to unauthenticated remote users A critical uncorrected vulnerability in the Cisco product called Small Business...
The company recommends that system administrators stay on the lookout for the release of update patches During its January update, the Oracle...
Developers recommend users to update their systems as soon as possible The Drupal content management system (CMS) has just launched two security...
New attacks that target a recent PHP framework vulnerability have been detected. It was last month that a code vulnerability was detected...
More than 300 million users have downloaded this app, so the incident is very serious ES File Explorer is one of the...
Security investigators were able to steal access tokens attacking an Epic Games subdomain According to network security and ethical hacking specialists from...
This error could have allowed hackers to modify multiple travel details Ethical hacking and network security specialists from the International Institute of...
These flaws could lead to remote code execution on compromised systems According to experts in network security and ethical hacking from the...
Hyatt Hotels will begin collaboration with external experts to avoid incidents that may affect its customers’ personal data Network security and ethical...