Sign in to your account or register new one to have full control over your orders, receive bonuses and more.
New User? Register
Researchers have discovered two zero-day vulnerabilities on iOS affecting the Mail application on iPhones and iPads. These relatively old flaws are actively [...]
VMware has just released a fix for a highly critical scored 10 on the CVSSv3 scale found in Directory Service (vmdir), the directory service implemented with [...]
500 Google Chrome extensions secretly uploaded private data from millions of users. The technique used by hackers, called malvertising, remains difficult to [...]
Israeli researchers at Ben-Gurion University detailed a method, dubbed Brightness, to steal data from computers by capturing brightness video changes of the [...]
A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large [...]
A new bug on Whatsapp, based on MP4 videos flaws, has been revealed by Facebook. This vulnerability could lead to denial of service attacks or remote code [...]
After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]
Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.