Unpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your Computer

Unpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your Computer

The researcher discovered a code execution vulnerability in LibreOffice let an attacker hack your computer by just sending a weaponized document with...
Critical Account Take over Vulnerability Allows to Hack Your Instagram Account within 10 Minutes

Critical Account Take over Vulnerability Allows to Hack Your Instagram Account within 10 Minutes

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of your Instagram...
Multiple Vulnerabilities are Affected the Lenovo’s Server Infrastructure that allows Hackers to Execute Malicious Code

Multiple Vulnerabilities Affected Lenovo’s Server Infrastructure that allows Hackers to Execute Malicious Code

Researchers discovered several vulnerabilities that affected Lenovo servers/application infrastructure that could have exploited the systems integrity, availability, and confidentiality.
Tech giants hacked

8 World’s Biggest Tech Giants Including TCS, CSC, HPE, NTT Data Hacked by Chinese...

A new shocking report reveals eight of the world's biggest technology service giants hacked by the Chinese Ministry of State Security sponsor...
Telecom Networks

Chinese APT 10 Group Hacked Nearly 10 Telecom Networks and Stealing Users Call Records,...

Infamous Chinese APT 10 hackers compromised over 10 Telecom networks around the world under the campaign called Operation Soft Cell and stealing various...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security