29 year old Russian hacker

Most Wanted Linkedin Hacker gets Extradition from Czech Court

Most Wanted Linkedin Hacker gets Extradition from Czech Court, the court didn't define to which country it is. AleksandrovichNikulin was captured while on vacation in Prague...
Authentication Bypass Vulnerability

Authentication Bypass Vulnerability in Cisco REST API Let Hackers Take Control of Cisco Routers...

Cisco released a security update for critical Authentication Bypass vulnerability that resides in the Cisco REST API virtual service container for Cisco...
Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

WordPress Plugin Stop User Enumeration does not stop user enumeration

User Enumeration is the capacity to automatically figure out if a given account is valid on a system. By enumerating client accounts, you are at danger of locking...

WordPress Plugin copy-me vulnerable to CSRF

Wordpress Plugin copy-me vulnerable to CSRF, which allows unauthenticated attacker to copy posts. WordPress is web software you can use to create a beautiful website, blog, or app....
hive

Vault 8 Leaks: Wikileaks Revealed CIA’s Secret Malware Control System called “Hive” Source Code

Wikileaks revealed a source code for CIA's Malware control system called Hive which is used by CIA to control their Malware's that is running...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security