Fake emergency alerts are launched via vulnerability in LTE
A group of IT system audit specialists managed to trick the presidential alert system by sending a fake message that is impossible to be blocked by the phones of attendeesRead More →
A group of IT system audit specialists managed to trick the presidential alert system by sending a fake message that is impossible to be blocked by the phones of attendeesRead More →
Web application security specialists keep looking for a jailbreak method to exploit potential vulnerabilities present in iOS operating systems. Recently, expert Luca Todesco released a tfp0 exploit for iOS 13Read More →
Network security experts from the firm SafeBreach reported a severe vulnerability in Dell manufacturer’s SupportAssist software. According to the report, the flaw affects not only the devices of this company,Read More →
IT systems audit specialists reported a critical vulnerability in the Cisco Digital Network Architecture Center (DNA) that, if exploited, could allow a non-authenticated threat actor to access critical internal systemRead More →
According to information security audit specialists Mozilla has corrected its Firefox browser for the second time this week after receiving an alert about a spear phishing campaign targeting users ofRead More →
Windows shell is what, every hacker loves. There are various Windows payloads are designed to bypass Windows OS security mechanism. According to ethical hacking researcher of international institute of cyberRead More →
IT audit specialists claim that the more than 500 million Mozilla Firefox users are exposed to a critical vulnerability, so they should update to the latest version of the browserRead More →
Digital forensics services researchers warn that Linux and FreeBSD operating systems contain vulnerabilities that allow hackers to remotely lock servers and disrupt admins’ communications. Operating system distributors have recommended thatRead More →
Cybersecurity services specialists report the discovery of two vulnerabilities in Windows CE-operated Alaris Gateway workstations that support infusion pumps; according to the reports, if these flaws are exploited they couldRead More →
Experts in website security audits report the finding of a critical vulnerability in the extension of Evernote for Chrome browser that, if exploited, would allow hackers to hijack the victim’sRead More →