CWE Top 25

CWE Top 25 (2019) – List of Top 25 Most Dangerous Software Weakness...

MITRE has released a list of Top 25 Most Dangerous Software Errors (CWE Top 25) that are widely spread and leads to...
Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million Email Servers

Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million...

A Vulnerability resides in the Exim mail server allows both local and remote attacker to execute the arbitrary code and exploit the...
Twitter CEO Jack Dorsey Account Hacked using Sim Swapping Attack

Twitter CEO Jack Dorsey Account Hacked using Sim Swapping Attack

Twitter Co-founder & CEO Jack Dorsey account was hacked on last Friday by a hacking group called Chuckle Squad and continuously posting...
A Critical Vulnerability in Tesla Model S Let Hackers Clone The Car Key Within 2 Seconds & Steal Car

A Critical Vulnerability in Tesla Model S Let Hackers Clone The Car Key Within...

New cryptographic vulnerability in Tesla Model S key fob's encryption allows hackers to clone the key and steal the car without touching...
Critical Remote Code Execution Vulnerability in DHCP Client Let Hackers  Take Control of the Network

Critical Remote Code Execution Vulnerability in DHCP Client Let Hackers Take Control of...

A critical remote code execution vulnerability that resides in the DHCP client allows attackers to take control of the system by sending...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security