A recent surge in cybersecurity threats has highlighted a significant vulnerability in the digital supply chain…
Category: Security
Cocoapods Flaws Expose Thousands of iOS and MacOS Apps to Potential Attacks
Recent discoveries of critical vulnerabilities in Cocoapods, a prominent dependency manager for Swift and Objective-C programming…
RegreSSHion Vulnerability Exposes Millions of Linux Servers to Remote Code Execution
A newly discovered vulnerability in OpenSSH, named “regreSSHion” and tracked as CVE-2024-6387, poses a serious risk…
SnailLoad Attack: Spying on Your Network Without Malware
In the realm of cybersecurity, a novel attack called SnailLoad has emerged, demonstrating the evolving sophistication…
How Modern GPUs Make Your Passwords Vulnerable in Minutes
Despite the advancements in cybersecurity, a staggering 59% of real-world passwords are susceptible to hacking within…
NSA’s Simple Cybersecurity Tip for Smartphone Users: Just Reboot Weekly
In an era where cybersecurity threats are increasingly sophisticated, the National Security Agency (NSA) offers a…
BreachForums Resurfaces: A Cybercrime Phoenix or Law Enforcement Decoy?
BreachForums, a notorious data leak site previously shut down by the FBI and the US Department…
Hacker Cracks $3 Million Bitcoin Wallet, Unlocks Crypto Fortune
Joe Grand, a renowned hardware hacker, successfully unlocked a cryptocurrency wallet containing $3 million in Bitcoin…
Hacker’s Legal Ordeal with Nintendo Turns into Unexpected Blessing
Gary Bowser, a former hacker associated with the group Team Xecuter, which specialized in creating mod…
Quantum Computing Threatens Blockchain Security: Preparing for Q-day
In a recent discussion with Ripple, Professor Massimiliano Sala from the University of Trento highlighted the…
Linux Kernel Security Breach: A Two-Year Malware Infestation Unveiled
Linux Kernel’s Infrastructure Compromised by Malware for Two Years In a startling revelation, researchers from ESET…
bash_tls: minimalist TLS 1.2 in pure bash
bash_tls, a pioneering project that brings TLS 1.2 protocol capabilities directly into the realm of Bash…
Unveiling a Stealthy Windows Vulnerability: The Hidden Dangers of DOS-to-NT Path Conversion
New research unveiled at the Black Hat Asia conference reveals a significant security vulnerability in the…
Critical Flaw in PuTTY Exposes NIST P-521 Keys, Affects Major Software
A critical vulnerability has been identified in PuTTY versions 0.68 through 0.80, potentially compromising NIST P-521…
New Spectre v2 Exploit Targets Linux on Intel, Bypassing Current Defenses
Cybersecurity experts from VUSec at Vrije Universiteit Amsterdam have unveiled the first native Spectre v2 exploit…
Urgent Security Alert: Malicious Code Found in Popular Compression Tool, XZ Utils
Red Hat issued an urgent security alert for users of XZ Utils, a widely used data…
Android Phones Can Open Almost Any Hotel Room Door, Hackers Say
Security vulnerabilities in hotel room locks made by Dormakaba have been exposed by white-hat hackers Ian…
Unpatchable vulnerability in Apple chip leaks secret encryption keys
Researchers have identified a critical vulnerability in Apple’s M-series chips that allows for the extraction of…
First ever iOS trojan discovered — and it’s stealing Face ID data to break into bank accounts
The security landscape for iPhone users is shifting as the first banking trojan targeting iOS devices,…
sicat: The useful exploit finder
SiCat is a sophisticated exploit search tool that enhances cybersecurity efforts by enabling professionals to quickly…