BLURtooth

BLURtooth – A new Vulnerability Let Attackers to Overwrite the Authentication Keys

Security researchers from at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University discovered vulnerabilities related to Cross-Transport Key Derivation (CTKD)...
Google Maps XSS Bug

Google Maps XSS Bug – Bounty Doubled After the Original Fix had Failed

Google fixed the vulnerability with Google Maps that was reported through Google Vulnerability Reward Program (VRP) and in return, the researchers are...
Critical Code Execution Flaws With Adobe InDesign, Framemaker, and Experience Manager – Update Now!

Critical Code Execution Flaws With Adobe InDesign, Framemaker, and Experience Manager – Update Now!

Adobe has released updates that fix critical vulnerabilities in the Adobe InDesign, Framemaker, and Experience Manager. Attackers can exploit the vulnerability to...
APT Hackers Using Malicious Autodesk 3ds Max Software Plugin to Hack Architecture Firm Systems

APT Hackers Using Malicious Autodesk 3ds Max Software Plugin to Hack Architecture Firm Systems

Recently, the APT hackers exploited a vulnerability in the conventional 3D computer graphics Autodesk software in sequence to begin a new cyber-espionage...
CWE Top 25 – Mitre Released Top 25 Most Dangerous Software Bugs

CWE Top 25 – Mitre Released Top 25 Most Dangerous Software Bugs

Recently, Mitre released the top 25 most dangerous software bugs 2020; this list is a definitive list of the most popular and...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security