How to Secure Your VPS Server
Nearly everyone with an online presence needs to pay attention to web hosting security. It no longer applies to the big businesses alone because cyber threats can happen to anyone.Read More →
Nearly everyone with an online presence needs to pay attention to web hosting security. It no longer applies to the big businesses alone because cyber threats can happen to anyone.Read More →
A team of computer forensics specialists have reported the finding of two vulnerabilities in FortiClient and FortiGateCloud, of Fortinet Inc. According to the report, exploiting these flaws could lead toRead More →
The Zero Day Initiative malware reverse engineering specialists have released a security alert about a serious privilege escalation vulnerability in Parallels Desktop, the most popular virtual machine software for theRead More →
Phishing attacks are one of the main threats to technology users. Hackers constantly seek to deceive victims by usurping the name of well-known brands, companies or products, deploying massive campaignsRead More →
Specialists in a cyber security course have revealed the discovery of at least three critical security vulnerabilities in FreeRDP, a free Remote Desktop Protocol library. According to the report, successfulRead More →
CVE-ID: CVE-2020-13164 CWE-ID: CWE-400 – Uncontrolled Resource Consumption (‘Resource Exhaustion’) Exploit availability: No Description The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerabilityRead More →
The cryptocurrency community has suffered a severe blow. According to experts in a hacking course, a malicious hacker managed to extract the databases of Trezor, Ledger and Keepkay, which provideRead More →
Introduction There are many instances where you want to extract something from the screenshots or pictures. Hackers uses some of these techniques to extract data from images. Now, we listRead More →
Although the malicious hacking community is huge, it is fair to mention that there are also hackers dedicated to protecting less experienced users in the world of cybersecurity. Specialists inRead More →
One of the main features of the ransomware is its ability to evolve and improve its capabilities to infect attacked systems. Specialists in a cyber security course reported the detectionRead More →