Hacker Exploits an Old Microsoft Office Vulnerability to Deliver RATs

Cybersecurity researchers have recently come across an unknown threat actor conducting a crimeware operation in which it attacks organizations in India and Afghanistan using political and government-themed malicious domains. As…

20+ Free Remote Desktop Software Tools You Need to Know

Remote desktop software is basically a computer program that lets you connect to another computer. The PC you will connect to is named “the host”, your PC from where you…

Google Crushes YouTube Cookie-Stealing Channel Hijackers

Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels.  Google has caught and brushed off…

Best VPN for torrenting 2021

BitTorrent is a complex topic. As a technology, it’s perfectly legal. But what you do with it could be illegal. Before we dive into the legalities of torrenting, let’s do…

New Linux kernel memory corruption bug causes full system compromise

Researchers dubbed it a “straightforward Linux kernel locking bug” that they exploited against Debian Buster’s 4.19.0.13-amd64 kernel. In 2017, MacAfee researchers disclosed a memory corruption bug inside the Linux kernel’s UDP…

A Well-Known Bug Bounty Platform Wants Zero-day Exploits for Windows VPN Clients

Zerodium is a premium bug bounty platform created by cybersecurity specialists with zero-day exploit and vulnerability research experience. The goal of Zerodium is to gather together independent security researchers to…

Duckduckgo vs Google: A Security Comparison and How to Maximize Your Privacy

Are you preoccupied with privacy? You’ve come to the right place. In today’s guide, I’ll go through everything you should know about Duckduckgo vs Google, how each of them works…

iPhone Hackers Win $300K

iPhone Hackers Win $300K A white hat hacking team has won a life-changing amount of money for completing the world's first public remote jailbreak of the iPhone 13 Pro. The…

Twitter Suspends Accounts Used to Snare Security Researchers

The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea. Twitter has shuttered two accounts – @lagal1990 and @shiftrows13 –…

iPhone 13 Pro, Windows, Chrome, Linux and others pwned at Tianfu Cup

Tianfu Cup is a version of the Pwn2own in which hackers from Kunlun Lab managed to secure first place by hacking iPhone 13 through a vulnerability in the Safari mobile…