Posted in Vulnerabilities

Critical Adobe Vulnerabilities

What are Adobe Vulnerabilities? Lately, Adobe has officially release patched two critical flaws that to Acrobat and Reader (CVE-2018-16011 & CVE-2018-16018). The first updates in…

Continue Reading...
Posted in Vulnerabilities

What is the LIBSSH vulnerability?

SSH provides a secure communication channel to access a remote computer. A developer can choose to use LIBSSH in their application server to transfer files,…

Continue Reading...
Posted in Vulnerabilities

TOR bug

Recently, there have been found a bug in TOR whether using http or HTTPs that been triggered where it’s known as “TORMOIL” a members of…

Continue Reading...
Posted in Vulnerabilities

Reaper Botnet

A new botnet called “Reaper” have been notice as a massive issues since middle of September this year. This new botnet “Reaper” is basically is…

Continue Reading...
Posted in Vulnerabilities

Apache Struts Vulnerabilities

There’s a new vulnerabilities that might be threaten almost a number companies where the vulnerabilities came from Apache Struts. For those are not aware what…

Continue Reading...
Posted in Vulnerabilities

Mac FruitFly

What is FruitFly? Recently, there is a news that Mac Malware called FruitFly was been discovered inside the Mac System which been there since early this year….

Continue Reading...
Posted in Vulnerabilities

LeakerLocker

What is LeakerLocker Ransomware? After a number of  ransomware happen around May and June such as (WannaCry, Petya, BadLock and so on) there’s a new…

Continue Reading...