Researchers noticed that the darknet is discussing exploits as a service
Analysts at Digital Shadows have prepared a report on the exploit market…
Trojan Source attack is dangerous for compilers of most programming languages
Scientists at the University of Cambridge, Ross Anderson and Nicholas Boucher, have…
PoC exploit published for fresh vulnerability in Ghostscript
A PoC exploit for a fresh vulnerability in Ghostscript was presented this…
Atlassian Confluence vulnerability was exploited to install miners
In late August, Atlassian released a hotfix for a Confluence Remote Code…
Dangerous bug in WhatsApp could lead to disclosure of user data
Check Point specialists spoke about a dangerous bug they discovered in the…
Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale
Bleeping Computer discovered that an exploit that uses the memory buffer of…
ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange
A dangerous vulnerability called ProxyToken has been discovered in Microsoft Exchange. An…
Over 2000 Exchange Servers Hacked Using ProxyShell Exploit
Researchers at Huntress Labs estimate that over the past few days, about…
Hackers exploit ProxyShell vulnerabilities to install backdoors
Experts warn that hackers are attacking Microsoft Exchange servers, exploiting ProxyShell vulnerabilities,…
Vulnerability in Windows 10 could allow gaining administrator privileges
Last weekend, the well-known cybersecurity researcher Jonas Lykkegaard reported a rather serious…
Researchers trick Windows Hello with infrared image
CyberArk researchers tricked the Windows Hello biometric authentication system that is included…
New Issues Found with Windows Print Spooler
Last month, cybersecurity experts inadvertently unveiled a PoC exploit for a dangerous…