Four Zero Day Vulnerabilities Discovered in Internet Explorer! Hewlett-Packard’s Zero Day Initiative greeted Microsoft today with not one but four zero day vulnerabilities located in…
Category: Threat
Dangerous Duke APT Trojan Uses OneDrive
[URGENT] Duke APT Gets Major Update: Cloud and Linux Support In recent weeks Duke APT group’s toolkit, SeaDuke and CloudDuke trojans have received major updates….
Top Hacking Software Used by Hackers and Security Professionals
Hacking has increasingly become a serious threat to the security of data and systems. It is very important for organizations, businesses, and individuals to stay…
Hacking Team Client List
Hacking Team Client List Leaking of Hacking Team dump has revealed many important details about current stance of cyber security and surveillance. In order to…
Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution [FIX]
Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution New critical vulnerability has been discovered in all Windows versions dubbed CVE MS15-078. A remote code…
Own a Chrysler Vehicle? Hackers Can Hack 500,000 Chrysler Cars
Own Chrysler? Hackers Can Hack 500,000 Chrysler Cars Right now Chrysler is under investigation and in upcoming weeks, cyber security researchers are going to reveal…
