Critical Samba vulnerabilities easily allow hacking of servers
Samba is a free software project that runs on operating systems that are similar to UNIX and supports the Windows file sharing protocol. This protocol once went by the nameRead More →
Samba is a free software project that runs on operating systems that are similar to UNIX and supports the Windows file sharing protocol. This protocol once went by the nameRead More →
An adversary may circumvent encryption for some communications by exploiting a flaw in the widespread 802.11 protocol, which enables them to do so. The university researchers that made the discoveryRead More →
The Near-Ultrasound Invisible Trojan, or NUIT, was developed by a team of researchers from the University of Texas at San Antonio and the University of Colorado Colorado Springs as aRead More →
The Exynos Modems manufactured by Samsung Semiconductor were found to have eighteen 0-day vulnerabilities, as revealed by Project Zero. Internet-to-baseband remote code execution was possible due to the four vulnerabilitiesRead More →
Cellebrite, an Israeli company that specializes in mobile forensics, seems to have been the victim of yet another data breach, in which hackers made off with 1.7 terabytes worth ofRead More →
According to a research conducted by NTU, hackers are able to guess the PIN on your phone by exploiting its sensor data. Hackers may be able to unlock a smartRead More →
Nintendo has secretly released a fix for a security flaw that might have allowed hackers to access compromised Switch, 3DS, and Wii consoles. Do you remember when Nintendo finally issuedRead More →
In a coordinated operation on October 10 throughout the three nations, 31 people were detained. A total of 22 addresses were raided, and illicit assets worth over EUR 1 098Read More →
Two security flaws in WhatsApp’s chat app for iOS and Android that might have been used to remotely execute malware on the device were recently reported by the company Meta. CVE-2022-36934,Read More →
Entrust is accused by LockBit of being behind the cyberattack. If such were the case, a genuine security firm would never retaliate by conducting a DDoS assault against criminals.Following aRead More →