Phantom Attack Bluffs Self Driving Cars By Displaying Simulated Objects

Recent research has demonstrated a phantom attack that fools self-driving cars by displaying virtual objects. Such attacks can trigger sudden

Read more

TI WooCommerce Wishlist WP Plugin Flaw Could Allow Site Takeovers

One more vulnerable WordPress plugin requires immediate attention from the users. This time, the flaw appeared in the TI WooCommerce

Read more

TikTok Launches Bug Bounty Program As It Partners With HackerOne

Amidst the US-China-TikTok tussle and security snafus, the Chinese video-sharing app has taken an important step. Specifically, TikTok has launched

Read more

Microsoft Released Out-of-Band Fixes For Two Remote Code Execution Bugs

With monthly scheduled updates for October, Microsoft rolled out fixes for 87 different vulnerabilities, including some publicly known exploits. Days

Read more

Multiple Vulnerabilities In Discord Desktop App Could Allow RCE Attacks

Japanese bug bounty hunter Masato Kinugawa has found multiple vulnerabilities affecting the Discord Desktop app. Elaborating on his findings in

Read more

SonicWall VPN Devices Troubled With Critical Denial-of-Service (DoS) Vulnerability

Thousands of SonicWall VPN devices have a serious vulnerability triggering DoS attacks. While the patch is out, users must ensure

Read more

Barnes & Noble Went Down Following Cyber Attack

Joining the trail of cybersecurity victims, now appears the bookseller Barnes & Noble as they suffered a cyber attack. The

Read more

Zoom Rolls Out End-to-End Encryption As Technical Preview

The much-awaited decision from Zoom has finally arrived. As announced recently, Zoom now rolls out end-to-end encryption for all users

Read more

New BleedingTooth Bluetooth Vulnerability Targets Linux

Researchers have found a new vulnerability affecting Linux devices. Dubbed BleedingTooth, the Bluetooth vulnerability allows remote code execution on target

Read more
Do NOT follow this link or you will be banned from the site!