News

WhatsApp Quote Feature Security Issue

Zerodium doubles the payouts for mobile vulnerabilities reported by bounty hunters. Security researchers have an increasingly harder time to hack…

|
Last updated September 23, 2021
evlink

EVLink charging station found to have three serious vulnerabilities that are now fixed with a patch. Schneider Electric issued the…

|
Last updated September 23, 2021
Hacking Codes

Five popular hosting service providers were found to be 'easy to hack' by an independent researcher. The vulnerabilities allow account…

|
Last updated September 23, 2021
threadx logo

Four memory corruption problems were found to plague many versions of the ThreadX firmware. One of them is especially easy…

|
Last updated September 23, 2021
wordpress_security

A WordPress plugin that is used by many thousands of websites out there can lead to complete website takeover. The…

|
Last updated September 23, 2021
containers

Security researchers have discovered a “breakout” vulnerability that affects major cloud services. Patches are rolling out in a deluge of…

|
Last updated September 23, 2021
xiaomi_scooter

Attackers can send commands to the Xiaomi M365 e-scooter and risk the lives of its riders. The commands can be…

|
Last updated September 23, 2021
vkontakte

A team of hackers played a prank against the VKontakte IT team after the latter failed to acknowledge a bug…

|
Last updated September 23, 2021
lenovo_watch_x

Lenovo Watch X contains at least six serious vulnerabilities that undermine the privacy and security of the wearer. The smartwatch…

|
Last updated September 23, 2021
5g_4g_networks_antenna

Locating users, pushing fake data to them, and extracting their personal information is possible via vulnerabilities found in 4G/5G networks. …

|
Last updated September 23, 2021
winrar_featured

Users of WinRAR opening an ACE archive may end up having extractions of malicious files in various locations. The old…

|
Last updated September 23, 2021
blog-drupal-module

It took hackers only a couple of days to launch multiple attacks against unprotected Drupal websites. The release of a…

|
Last updated September 23, 2021
chrome_browser

High severity Chrome vulnerability discovered by Google, but attackers reportedly discovered it first. The vulnerability allows for arbitrary code execution…

|
Last updated September 23, 2021
malware_code

A new malware that communicates via Slack, and uses GitHub gist snippets is spotted on the wild. The particular malware…

|
Last updated September 23, 2021
Unlocked padlock

Four VPN solutions offered by respected vendors are found to contain severe vulnerabilities. The flaws concern the way these products…

|
Last updated September 23, 2021
wifi_wpa3

The WPA3 standard is plagued by five vulnerabilities, four of which are quite severe. The flaws allow for accessing a…

|
Last updated September 23, 2021
belkin_wemo_insight

Belkin’s Wemo Insight is still plagued by the same zero-day vulnerabilities that were disclosed a year ago. The product is…

|
Last updated September 23, 2021
d-link_cloud_cam

The D-Link DCS-2132L is encrypting none of its sensitive communication information. An attacker could intercept the data stream, gather the…

|
Last updated September 23, 2021

Google offers free replacements for Bluetooth Titan keys that are vulnerable to attacks. A misconfiguration could allow an attacker in…

|
Last updated September 23, 2021
Linksys Modem

A wide range of Linksys Wi-Fi routers is leaking sensitive information that can lead to serious problems. Most of the…

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: