News

wifi encryption

โ€œKr00kโ€ is a new vulnerability affecting unpatched Wi-Fi access points and devices using the WPA2 protocol. There are over aโ€ฆ

|
Last updated September 23, 2021
mediatek

More than a dozen MediaTek 64-bit processors are vulnerable to a critical vulnerability. The flaw was known for over aโ€ฆ

|
Last updated September 23, 2021
NordVPN

Two HackerOne reports show that NordVPN was in serious trouble with user data disclosure. Both problems have been fixed sinceโ€ฆ

|
Last updated September 23, 2021
windows flaw

Microsoft discovered highly malicious targeted activity exploiting zero-day flaws in Windows. The tech company has provided three mitigations, but aโ€ฆ

|
Last updated September 23, 2021
Login Screen Access Granted

Given the fact that many countries around the globe have started to close down offices and other non-essential businesses, manyโ€ฆ

|
Last updated September 23, 2021
VPN

The latest version of the iOS comes with a VPN-undermining bug that prevents network data encryption. The problem is thatโ€ฆ

|
Last updated September 23, 2021
network equipment

DrayTek equipment was under active exploitation between December 2019 and February 2020. The network equipment vendor has released a fixingโ€ฆ

|
Last updated September 23, 2021
saudi arabia

Saudi spies are following the movement of their citizens in the United States and various European countries. The spies areโ€ฆ

|
Last updated September 23, 2021
iPhone 11 Pro Press Image

A talented security researcher has received $75,000 from Apple for reporting seven zero-days. Three of these flaws could be usedโ€ฆ

|
Last updated September 23, 2021
chinese embassy

The โ€œDarkHotelโ€ APT was engaging in cyber-espionage operations against the Chinese government. The hackers have set up a very cleverโ€ฆ

|
Last updated September 23, 2021
valve gaming

Someone has published the old source code of two Valve games, and players panicked. Usually, this is the first stepโ€ฆ

|
Last updated September 23, 2021
thunderspy

A new Thunderbolt attack can exfiltrate data from laptops without going through authentication. The attack is based on seven vulnerabilitiesโ€ฆ

|
Last updated September 23, 2021
WordPress logo

Almost one million WordPress sites are under attack by an extensive network of malicious actors. The attacks are based onโ€ฆ

|
Last updated September 23, 2021
StrandHogg2.0

StrandHogg is back, and this time it is more stealthy and dangerous than its predecessor. The flaw affects Android 8.0,โ€ฆ

|
Last updated September 23, 2021

NordVPN has processed data from 50 countries, ranking them by the risk of their citizens becoming cybercrime victims. Individuals fromโ€ฆ

|
Last updated September 23, 2021

A security researcher has figured a way to take over any account based on the โ€œSign in with Appleโ€ system.โ€ฆ

|
Last updated September 23, 2021
Microsoft_Retpoline

Microsoft pushes yet another massive โ€œPatch Tuesdayโ€ that squashes 129 bugs. Only 11 flaws are rated as critical, so theโ€ฆ

|
Last updated September 23, 2021
ransomware

The โ€œeCh0raixโ€ group has returned with a ransomware strain that is no longer possible to decode. The group is askingโ€ฆ

|
Last updated September 23, 2021
Netgear_Router

79 Netgear router models are vulnerable to a pretty simple and versatile exploitation method. Even after three months, the vendorโ€ฆ

|
Last updated September 23, 2021
duck

A team of student IT researchers discovered a way to look into DuckDuckGo search queries. Apparently, the search engineโ€™s autocompleteโ€ฆ

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: