New iPhone exploit checkm8 is unpatchable and can possibly lead to permanent jailbreak on...
An unnamed iOS researcher that goes by the Twitter handle @axi0mX has released a new iOS exploit, checkm8 that affects all iOS devices running...
Researchers release a study into Bug Bounty Programs and Responsible Disclosure for ethical hacking...
On September 26, a few researchers from the Delft University of Technology (TU Delft) in the Netherlands, released a research paper which highlighted the...
DoorDash data breach leaks personal details of 4.9 million customers, workers, and merchants
Today, DoorDash revealed to its users that their platform suffered a major data breach on May 4, 2019, affecting approximately 4.9 million consumers, dashers,...
How has ethical hacking benefited the software industry
In an online world infested with hackers, we need more ethical hackers. But all around the world, hackers have long been portrayed by the...
A zero-day pre-auth vulnerability is currently being exploited in vBulletin, reports an anonymous researcher
Update: Six days after an anonymous researcher had disclosed a zero-day pre-auth remote code execution vulnerability in vBulletin, Cloudflare has deployed a new rule...
Click2Gov software vulnerable for the second time; breach hits 8 US cities
A vulnerable municipality software, Click2Gov, is known to be part of a breach involving eight cities last month, Threatpost reports. The Click2Gov software is...
MITRE’s 2019 CWE Top 25 most dangerous software errors list released
Two days ago, the Cybersecurity and Infrastructure Security Agency (CISA) announced MITRE’s 2019 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors list....
An unsecured Elasticsearch database exposes personal information of 20 million Ecuadoreans including 6.77M children...
Data leaks have become commonplace. Every week we hear of at least one data breach that has existed maybe over months or years without...
UK’s NCSC report reveals significant ransomware, phishing, and supply chain threats to businesses
Last week, the UK’s National Cyber Security Centre (NCSC) published a report on cyber incident trends in the UK from October 2018 to April...
A new Stuxnet-level vulnerability named Simjacker used to secretly spy over mobile phones in...
Updated: On September 27, a few researchers from the Security Research Labs (SRLabs) released five key research findings based on the extent of Simjacker...