Tag: Vulnerabilities

Bug Bounty Researchers Make More than 2.7 Times Salary of an Average Software Engineer

The HackerOne, a leading Bug Bounty Platforms published a survey of top 1,698 Bug Bounty Researchers earns in an average of more than 2.7...
ASUS Routers

All Versions of ASUS Routers Affected by Multiple Vulnerabilities that Allows to Gain Complete...

Multiple critical vulnerabilities discovered in ASUS Routers that allow an attacker can able to gain complete control of the router access and this flaw...
Microsoft Office Vulnerabilities

New Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware that Creating Backdoor

Recently patched critical Microsoft office vulnerabilities are used for distributing powerful Zyklon Malware that has some sophisticated functionalities such as creating a backdoor in victims...
TLS/SSL vulnerabilities

testssl.sh – Tool to check cryptographic flaws and TLS/SSL Ciphers on any Ports

testssl.sh is a free command line tool which checks a server's administration on any port for the help of TLS/SSL ciphers, protocols and some...
Dictionary Attack

DOWNAD Malware using Dictionary Attack to Control the Servers & Remotely Execute Code

A Banking Trojan called DOWNAD has been discovered after 9 years that is capable of remotely inject malicious code into a server and also...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended