iPhone New Zero-Day Psychic Paper Exploit Allows Access to your Entire iPhone Siguza, an iOS researcher, recently reported a ‘Psychic Paper’ exploit where Cyberattackers can access your iPhone’s 100% private data including sensitive files, photos, messages, etc. by implementing Sandbox Escape exploit in malicious applications. Mishka Grey 2 May 2020 • 4 min read
exploit Malicious version of FTP Software FileZilla stealing users' Credentials Warning: Malicious version of FTP Software FileZilla stealing users' Credentials Malware code can be very small, and the impact can be very severe! The Antivirus firm AVAST spotted a malicious Geetansh Jindal 29 Jan 2014 • 2 min read
vulnerability Yahoo fixes Critical Remote Command Execution vulnerability Yahoo fixes Critical Remote Command Execution vulnerability Cyber Security Expert and Penetration tester, Ebrahim Hegazy has found a serious vulnerability in Yahoo's website that allows an attacker to remotely execute Geetansh Jindal 26 Jan 2014 • 1 min read
vulnerability Network Enabled Samsung TVs vulnerable to Denial of Service Attack Network Enabled Samsung TVs vulnerable to Denial of Service Attack Download Exploit A vulnerability in the latest firmware of the network-enabled Samsung TV models allows potential attackers to crash the Geetansh Jindal 23 Jul 2013 • 1 min read
exploit Internet Explorer 8 zero-day attack spreads on 9 other sites Internet Explorer 8 zero-day attack spreads on 9 other sites Watering hole Internet Explorer 8 zero-day attack on the US Department of Labor website last week has spread to 9 Geetansh Jindal 9 May 2013 • 1 min read
exploit Microsoft flaw allows USB loaded with payload to bypass security controls Microsoft flaw allows USB loaded with payload to bypass security controls During March Patch Tuesday of 2013, Microsoft released seven new security bulletins, with four rated as critical, and others Geetansh Jindal 17 Mar 2013 • 1 min read
exploit Chrome, Firefox, Java, IE10 exploited at Pwn2Own competition Chrome, Firefox, Java, IE10 EXPLOITED at Pwn2Own competition During the first day of Pwn2Own competition at the CanSecWest conference in Vancouver , latest versions of all major browsers were exploited by Geetansh Jindal 7 Mar 2013 • 1 min read
exploit Yahoo Exploit available for $700 Yahoo Exploit available for $700 An Egyptian hacker “TheHell” is selling an exploit in $700 that allows individuals to hijack a Yahoo! email account. The method is shown off in Geetansh Jindal 28 Nov 2012 • 1 min read
exploit New Internet Explorer zero-day EXPLOIT released New Internet Explorer zero-day EXPLOIT released The new zero day exploit Of Internet Explorer has been discovered. By using this Exploit attacker can load malicious application on victim machines even Geetansh Jindal 19 Oct 2012 • 1 min read
exploit Critical vulnerability in Java Critical vulnerability in Java - Billions of Users affected Security Explorations Researchers disclosed a new Serious vulnerability in Java that could allow an attacker to control victim's computer. The Vulnerable Geetansh Jindal 30 Sep 2012 • 1 min read
exploit Android Exploit: Force Factory Reset remotely Android Exploit: Force Factory Reset remotely "Android can be Exploited Remotely ". now just Clicking one wrong link can cause malicious code to execute, which could do anything Like Geetansh Jindal 28 Sep 2012 • 1 min read
exploit iPhone 5 and 4 Hacked !! Exploit Available iPhone 5 and 4 Hacked with same Exploit iPhone 5 is vulnerable to the same attack that successfully breached an iPhone 4S at the mobile Pwn2Own hacker contest held this Geetansh Jindal 23 Sep 2012 • 1 min read
exploit Zero day Exploit for Internet Explorer Exploit Released for Internet Explorer zero-day attacks : CVE-2012-4969 Microsoft has confirmed reports that a zero-day vulnerability in its Internet Explorer browser is being actively attacked in the wild. Four active Geetansh Jindal 21 Sep 2012 • 2 min read
vulnerability Critical vulnerability in Photoshop CS6 Critical buffer overflow vulnerability in Photoshop CS6 Adobe has released an update for Photoshop CS6 that closes a critical heap-based buffer overflow vulnerability (CVE-2012-4170) in its popular graphics editing program. Geetansh Jindal 2 Sep 2012 • 1 min read
vulnerability Another Major Vulnerability in JAVA Yet another Vulnerability in JAVA after Update Oracle released an emergency patch on Thursday for previously unknown Java vulnerabilities that cybercriminals had targeted with popular exploit kits within hours after Geetansh Jindal 1 Sep 2012 • 1 min read
exploit 0-day vulnerability in Java Runtime FireEye spotted Critical 0-day vulnerability in Java Runtime Environment FireEye's Malware Intelligence Lab is making the claim that there is a new zero day vulnerability in the wild that affects Geetansh Jindal 28 Aug 2012 • 2 min read
exploit Hijacking Servers Remotely Hijacking Servers Remotely with Hikit advanced persistent threat Security researchers have revealed the existence of an advanced persistent threat that has been making the rounds since April 2011. Backdoor.Hikit Geetansh Jindal 27 Aug 2012 • 1 min read
exploit iPhone Bug Allows SMS Spoofing Serious Security Flaw : iPhone Bug Allows SMS Spoofing iPhone Hack A rather serious security flaw in the iPhone’s SMS messaging system has been discovered and revealed by well-known security Geetansh Jindal 17 Aug 2012 • 2 min read