5 Popular Web Hosting Services Found Vulnerable to Multiple Flaws

A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world’s most popular and widely-used web hosting companies that could have put millions of their customers as well as billions of their sites’ visito… Continue reading 5 Popular Web Hosting Services Found Vulnerable to Multiple Flaws

Unpatched vCard Flaw Could Let Attackers Hack Your Windows PCs

A zero-day vulnerability has been discovered and reported in the Microsoft’s Windows operating system that, under a certain scenario, could allow a remote attacker to execute arbitrary code on Windows machine.

Discovered by security researcher John Pa… Continue reading Unpatched vCard Flaw Could Let Attackers Hack Your Windows PCs

Over 202 Million Chinese Job Seekers’ Details Exposed On the Internet

Cybersecurity researcher has discovered online a massive database containing records of more than 202 million Chinese citizens that remained accessible to anyone on the Internet without authentication until last week.

The unprotected 854.8 gigabytes o… Continue reading Over 202 Million Chinese Job Seekers’ Details Exposed On the Internet

New Systemd Privilege Escalation Flaws Affect Most Linux Distributions

Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could allow unprivileged local attackers or malicious programs to gain root access on the targeted s… Continue reading New Systemd Privilege Escalation Flaws Affect Most Linux Distributions

NSA to release its GHIDRA reverse engineering tool for free

The United States’ National Security Agency (NSA) is planning to release its internally developed reverse engineering tool for free at the upcoming RSA security conference 2019 that will be held in March in San Francisco.

The existence of the framewor… Continue reading NSA to release its GHIDRA reverse engineering tool for free

New Malware Takes Commands From Memes Posted On Twitter

Security researchers have discovered yet another example of how cybercriminals disguise their malware activities as regular traffic by using legitimate cloud-based services.

Trend Micro researchers have uncovered a new piece of malware that retrieves … Continue reading New Malware Takes Commands From Memes Posted On Twitter

WhiteSource Bolt for GitHub: Free Open Source Vulnerability Management App for Developers

Developers around the world depend on open source components to build their software products. According to industry estimates, open source components account for 60-80% of the code base in modern applications.

Collaboration on open source projects t… Continue reading WhiteSource Bolt for GitHub: Free Open Source Vulnerability Management App for Developers

Why you need to know about Penetration Testing and Compliance Audits?

We live in an age where data flows like water, becoming the new life source of our everyday ventures.

As such, you can just imagine what all of that entails and the weight that data receive, especially when it comes to a decision making on how to han… Continue reading Why you need to know about Penetration Testing and Compliance Audits?

Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty

A 23-year-old hacker from Utah pleaded guilty this week to launching a series of denial-of-service (DoS) attacks against multiple online services, websites, and online gaming companies between 2013 and 2014.

According to a Justice Department (DoJ) pre… Continue reading Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty

Fortnite for Android Released, But Make Sure You Don’t Download Malware

Yes, it is official. The massively popular battle royale video game from Epic Games, Fortnite: Battle Royale is finally available for Android devices.

Epic announced Thursday that the Android version of Fortnite is now available for everyone to downlo… Continue reading Fortnite for Android Released, But Make Sure You Don’t Download Malware