Exclusive Content:

Protect Your Sensitive Information with Zero Trust Networking

Zero trust networking is a security approach that assumes...

Protecting Your Business: The Importance of Web Application Security

We all rely on web applications in our daily...

Incident Response Guide for Small Businesses

Cybersecurity is a critical concern for all businesses, but...

Vulnerabilities

0-Day Vulnerability – How it Works?

A 0day (Zero-day) vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to...

0-day vulnerability founded in popular WordPress plugin

On April 21, 2021, the Wordfence Threat Intelligence reported a critical 0-day vulnerability that is being actively exploited in Kaswara Modern WPBakery Page Builder Addons.This...

CentOS Web Panel Cross Site Scripting

Exploit author DKM annouce that CentOS Web Panel version 0.9.8.78 suffers from a persistent cross site scripting vulnerability.# Exploit Title: CentOS Web Panel 0.9.8.789...

Now Available: Exploit Code for the Kubernetes Flaw

The recently disclosed critical-impact bug in Kubernetes created strong ripples in the security space of the container-orchestration system. Now, multiple demo exploits exist and come with easy-to-understand explanations.The severity...

FaceTime group call exploit hits Apple’s iOS 12.1

Newest APPLE'S IOS 12.1 UPDATE doesn't just bring CPU throttling to the iPhone 8 and iPhone X, but also comes with a security flaw that allows the lockscreen...

Windows 10 Bug Access All Files without User Knowledge

These days we read how Microsoft silently patched a bug in its Windows 10 OS with the October 2018 update (ver. 1809) that allowed Microsoft Store...

Recent Stories

spot_img

Stay on top - Get the weekly news in your inbox

Subscribe