A new vulnerability in the Chrome browser is being exploited by hackers.
Continue readingCategory: vulnerability
Bluetooth vulnerability BleedingTooth allows remote code execution in user devices.
A new Bluetooth vulnerability allows hackers to launch RCE attacks on user devices.
Continue readingA recently found flaw allows hackers to fully access user Instagram accounts
Hackers are targeting Instagram user accounts by exploiting certain flaws in the application.
Continue readingFirefox android browser hijacked by hackers by exploiting critical vulnerability
Mozilla has recently fixed a bug in its android browser that was being exploited by hackers.
Continue readingMicrosoft server’s and VPNs unpatched vulnerabilities are being exploited by hackers
CISA has claimed that Chinese hackers are targeting cyber environment of various countries.
Continue readingFacebook hacked by researcher exploiting MobileIron MDM
Unauthenticated RCE on MobileIron Mobile Device Management (MDM) was exploited by researcher.
Continue readingDevices exposed to MITM attacks as hackers exploit BLURtooth vulnerability
The attacks that exploit the vulnerability are termed as BLUR attacks by security researchers.
Continue readingSpoofing mails sent by Gmail ids by exploiting Google’s vulnerability
Malicious actors used Google’s vulnerability to send malicious spoofing mails to targeted individuals.
Continue readingSecurity issue in Qualcomm’s Snapdragon chipset has put 40% of smartphones under risk
Snapdragon is a widely used chipset in almost every smartphone around the globe.
Continue readingWindows DNS servers impacted by an old ‘Wormable’ RCE vulnerability
Researchers have found a 17 year old Windows RCE vulnerability which is impacting users.
Continue reading