Mailgun’s WordPress website has been hit by a spray-and-pray hacking campaign, as part of the massive attack on WordPress websites. Mailgun, email automation, and delivery service providers have been targeted…
Read More
Mailgun’s WordPress website has been hit by a spray-and-pray hacking campaign, as part of the massive attack on WordPress websites. Mailgun, email automation, and delivery service providers have been targeted…
Read More
This is startling indeed- Hackers can infect CT, MRI scanners with the virus, manipulate scan results and create or erase cancer nodes as well. Cybersecurity experts in Israel have found…
Read More

Popular UI framework Bootstrap-Sass hosted malicious code in its library that provides an attacker to perform a remote code execution, the affected version is 3.2.0.3 and earlier. Security consulting firm,…
Read More
Georgia Tech (The Georgia Institute of Technology) has announced detection of a data breach that impacted 1.3 million people. A Georgia Tech notification, dated April 2, 2019, says, “Georgia Tech…
Read More
A vulnerability that was detected in the web version of Google Photos could be used by hackers to retrieve image metadata. ZDNet reports, “Google has patched a bug in its…
Read More
Just like the operating system itself, application software needs to be updated regularly in order to prevent the possibility of fixed security vulnerability from being taken advantage of by 3rd…
Read More
Signing-up for Managed Service Providers (MSP) is a quick solution to lower the cost of maintenance for workstation troubleshooting, repairs, and maintenance. However, allowing a 3rd party company as the…
Read More
Technical flaws were detected in the Swiss government’s electronic voting system. A team of cybersecurity researchers on Tuesday found this defect which could enable outsiders to replace legitimate votes with…
Read More
As WordPress gained popularity over its CMS competitors like Joomla and Drupal, it grew to a level where plugin developers jumped into the bandwagon effect. Plugins are a double-edged sword;…
Read More
A new Google Chrome zero-day vulnerability, which is being actively exploited in the wild, has been detected. Clement Lecigne, a security researcher who is part of Google’s Threat Analysis Group,…
Read More