Magellan 2.0

Magellan 2.0 – Multiple Chrome Vulnerabilities that Exists in SQLite Let Hackers Execute...

Critical SQLite vulnerabilities named "Magellan 2.0" discovered in World's most popular browser Google Chrome let hackers exploit the Chromium render process and...
Hackers Used Windows 0-day Exploit CVE-2019-1458 in Operation WizardOpium Cyber Attacks

Hackers Used Windows 0-day Exploit CVE-2019-1458 in Operation WizardOpium Cyber Attacks

Researchers discovered a newly patched Windows Zero-day vulnerability exploit already used in Operation WizardOpium attacks along with Chrome Zero-day exploit in last...
Microsoft Azure

Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the...

Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts and creating...
Buran Ransomware

RaaS – Hackers Selling Buran Ransomware in Russian Forum That Encrypt All Version of...

Researchers uncovered a new ransomware family named "Buran" ransomware that works as a Ransomware-as-a-Service(RaaS) model and actively selling in a well-known Russian...
PWN2OWN 2019

PWN2OWN 2019 (Day 1) – Ethical Hackers Earned $195,000 for Hacking Sony TV, Amazon...

Day 1 at the world's expensive hacking contest Pwn2Own Tokyo 2019, researcher hacked well-known products such as Sony TV, NETGEAR Router, TPLINK...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security