Through a GitHub repository, cybersecurity specialist Nguyen The Duc published the proof-of-concept (PoC) exploit code to achieve a successful exploitation of the newly identified zero-day vulnerability in Ghostscript servers. AccordingRead More →

Cybersecurity specialists report the detection of 7 vulnerabilities in the Xiaomi MDZ-36-DB Bluetooth speakers. According to the report, the successful exploitation of these flaws would allow the deployment of multipleRead More →

Bjørn Martin Hegnes is a computer science student who resides in Norway and has been using equipment for listening to Bluetooth and WiFi messages for academic purposes. As he mentions,Read More →

One of the most important Internet service providers in New Zealand suffered a massive denial of service (DoS) attack that left a considerable number of regions in the country offline.Read More →

Cisco security teams announced the correction of an authentication bypass vulnerability in Enterprise NFV Infrastructure Software (NFVIS). Tracked as CVE-2021-34746, this flaw resides in the TACACS+AAA system of the affectedRead More →

One of the main skills that a hacker must have is to know how to hide their trail to prevent investigators or cybersecurity and digital forensics experts from detecting theirRead More →

Cybersecurity specialists report the detection of a severe vulnerability in Linphone Session Initiation Protocol (SIP) that would allow threat actors to block an application remotely. SIP is a signaling protocolRead More →