Nord VPN was hacked

The VPN provider NordVPN apparently had an incident some time ago in which an attacker had access to the servers and private keys. Three...

Chinese Hackers Use New Malware to Backdoor Microsoft SQL Servers

New malware created by Chinese-backed Winnti Group has been discovered by researchers at ESET while being used to gain persistence on Microsoft SQL Server...

Anyone’s thumbprint can unlock Samsung Galaxy S10 phone

A flaw that means any fingerprint can unlock a Galaxy S10 phone has been acknowledged by Samsung. It promised a software patch that would fix...

UC browser users are exposed to MiTM attack

500+ Million UC Browser Android Users Exposed to MiTM Attacks. The highly popular UC Browser and UC Browser Mini Android apps, with a total...

Oracle update 219 security flaws in October 2019

Oracle has released a giant October 2019 Critical Patch Update (CPU) containing fixes for 219 security flaws affecting 23 products, many of which stem...

Malware Uses Your PC to Send Sextortion Emails

In a new report by Check Point Research, researchers show how the Phorpiex botnet is being used to distribute millions of sextortion emails and...

InviZible Pro – Android application for Internet privacy and security

InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the...

Adobe Fixes 82 Vulnerabilities

Adobe released security updates that cover 82 vulnerabilities in various products, out of 82 vulnerabilities 45 are rated critical and the rest of the...

Bypassing the CloudFlare and finding the server

Learn to bypass CloudFlare and find the server using the CloudFlair tool. Follow us on this hacking and security training. Search the server and...

Data breach from cashback websites

The security analysis team at Safety Detectives has uncovered associate one more information leak size 2 terabytes of data hosted on an Elastic Server....

Latest news