GTP

Multiple Flaws in GTP Tunneling Protocol Let Hackers to Attack 3G/4G/5G Users

Researchers from Positive Technologies Security discovered multiple vulnerabilities with GPRS Tunneling Protocol (GTP) that let attackers target network users. The GTP is...
Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million Email Servers

Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million...

A Vulnerability resides in the Exim mail server allows both local and remote attacker to execute the arbitrary code and exploit the...
Secret Backdoor found Installed in Zyxel Firewall and VPN

Secret Backdoor found Installed in Zyxel Firewall and VPN

Zyxel Communications Corp. is a manufacturer of networking devices. It is popular for firewalls that are marketed towards small and medium businesses. Their...
Microsoft Teams

Hackers Hijack Microsoft Teams Accounts Using a Single Weaponized GIF Image

Microsoft has patched a subdomain takeover vulnerability in Microsoft Teams that affects every user who uses the Teams desktop or web browser...
JhoneRAT

JhoneRAT – Hackers Launching New Cloud-based Python RAT to Steal Data From Google...

Researchers uncovered a new cloud-based Python RAT "JhoneRAT" that spreading via weaponized MS word document to steal sensitive data from multiple cloud-based...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security