Linux USB

Multiple Denial of Service Vulnerabilities Discovered in Linux kernel USB Subsystem

Multiple vulnerabilities found in Linux USB drivers that included with Linux kernel USB subsystem. It can be triggered by an attacker who has a...
MS Office Zero-day

All Versions of MS Office Affected with Critical Zero-day Vulnerability Allows Attackers Take Full...

A Critical MS Office Zero-day Remote Code Execution Vulnerability discovered in Microsoft Office that could allow attacker to take complete control of infected Windows...

Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority of devices...
Cloak & Dagger

Beware!! All Android Versions Up to 7.0 are Vulnerable to Toast Overlay Attack

Cloak & Dagger is a new class of potential attacks affecting Android devices. These attacks allow a malicious app to completely control the UI...
Apache

New Apache Struts Vulnerability Allows Attackers to Take Control Over Web Servers

Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability discovered on...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security