Triada malware on Android phones before leaving the factories

Google researchers have confirmed, group of cybercriminals managed to install the Triada malware on Android smartphones before leaving the factories of some Chinese manufacturers. Triada...

Cisco RV130W Remote Stack Overflow

Cisco has fixed critical flow in wireless VPN and firewall routers. Cisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows...

Exim 4.9.1 RCE vulnerability

Security researchers at Qualys has found remote code execution bug in older versions of mail transfer agent (MTA). Exim — a critical, open source...

Cisco security updates 2019

Cisco released security patches 2019. Cisco security updates 9 vulnerabilities in which, two high severity vulnerabilities and rest of 7 vulnerabilities marked as medium...

MS-SQL and PHPMyAdmin Servers Infected with Malware Rootkit

Guardicore Labs security researchers published today a full report on the campaign of theft that attacks PHPMyAdmin and MSSQL servers over the globe. Security...

Multiple Vulnerabilities in Microsoft .Net

Multiple vulnerabilities have been reported in Microsoft .Net Framework, which could be exploited by an unauthenticated remote attacker to cause a denial of service...

Leaks Millions of private data and resume from Headhunting firm

Headhunting is process of recruiting senior positions. It is basically style of recruiting may be undertaken by an organisation's board of directors, or HR...

Hotels database exposes more than 80GB

Unsecured database that exposed security logs and cybersecurity weakness of major hotels including Marriott locations have been uncovered by researchers. Security Researchers from VPNMentor, Noam...

Top 5 hacking ways every business should know

Nowadays, Business is deeply depending on technology. Hacking not only theft data, sale data on darkweb, and delete the entire data, it also causes...

TP-link routers at risk of Remote Code Execution

TP-Link routers are vulnerable based on CVE-2017-13772 Remote Code Execution. An attacker can get control of the router. The exploit relies on the router’s...

Latest news