Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

WordPress Plugin Stop User Enumeration does not stop user enumeration

User Enumeration is the capacity to automatically figure out if a given account is valid on a system. By enumerating client accounts, you are at danger of locking...
VLC Player

Critical Vulnerabilities in VLC Player Let Hacker Stream Untrusted Video To Hack Your PC...

Its time for hackers to hack your PC using malformed video file, yes, critical vulnerabilities in VLC media Player let attackers load...

Improved Fallout Exploit Kit – Now supports HTTPS and Flash exploit (CVE-2018-15982)

Fallout is an exploit kit (EK) first identified at the end...
iOS/macOS Camera

iOS/macOS Webcam Can be Hacked With A Single Click On Malformed Link – Hacker...

By just making the users visiting a link, an attacker can hack the users' iOS/macOS Camera using zero-day bugs in Safari.
E-Scooters Can Be Hacked Using Remote Locking System Manipulation

E-Scooters Can Be Hacked Using Remote Locking System Manipulation

Electric scooters, also called e-scooters, are a popular method of transportation in large cities. They are small, portable,...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security