So another 0-Day Flash Vulnerability is being exploited in the Wild, a previously unknown flaw which has been labelled CVE-2018-4878 …
dorkbot – Command-Line Tool For Google Dorking
usage: dorkbot.py [–h] [–c CONFIG] [–b BLACKLIST] [–d DATABASE] [–i INDEXER] [–l] [–o INDEXER_OPTIONS] [–p SCANNER_OPTIONS] [–s SCANNER] [–v VULNDIR] …
Researchers discover Malware Samples Designed to Exploit CPU Vulnerabilities
As of late scientists have found more than 130 malware samples intended to misuse the recently disclosed Spectre and Meltdown …
UK Government to Fine Infrastructure Organisations up to £17m for Lax Cybersecurity
Industries running critical infrastructure in the UK will be facing fines as much as £17 million ($24 million), if they …
The Team8 Portfolio Company, comes Out of Stealth and launches its First Product upon a Disruptive Hybrid Architecture
The Israeli cyber security company Hysolate founded by President Tal Zamir, a veteran of an elite Israeli cyber unit and …
Japan cryptocurrency exchange to refund stolen assets worth $400m
Coincheck, one of Japan’s major cryptocurrency exchange, has promised to refund to its customers about $423m (£282m) stolen by hackers …
OnePlus denies accusation of sending Clipboard data to China
OnePlus had been accused of sending Clipboard data taken from OnePlus phones in the latest OxygenOS Beta version to China …
Russia-linked hackers Fancy Bears leak data from International Luge Federation
A Russia-linked hacker group called “Fancy Bears” released a statement on Wednesday claiming to have leaked emails and documents that …
Official app stores targeted by malicious Bitcoin apps to steal money and personal data
Hackers are targeting app store users of Apple, Google Play, SameAPK, APKPlz and other with malicious cryptocurrency apps to steal …
Power grids facing cyber security threat
The cybersecurity experts claimed to have discovered yet another fatal virus in the power grid system forcing the authority to …