Home security App - Mobile Artificial intelligence (AI)

Artificial intelligence (AI)

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by the security...

Important Checklist for Security Leakage Before Initiating Data Migration

Security leakage is a great concern when it comes to data migration. It not only hampers organizational reputation but can jeopardize the privacy of individuals as well. As organizations are...

[NT Conference 2019] Vulnerabilities in Credentials & How to Fix Them

On May 23rd, at the 24th NT Conference in Portorož, Slovenia, you could meet Mike Jankowski-Lorek, our Cloud Security and Database Expert. During his speech, Mike presented the traps of...

Vulnerability in WP Live Chat Plugin Let Hackers to Inject Malicious Script

An Unauthenticated Persistent Cross-Site Scripting vulnerability in WP Live Chat Support WordPress plugin allows hackers to inject malicious JavaScript payloads in the vulnerable website. More than 60,000+ users used the plugin,...

Crowdfense Willing to Pay $3 Million for iOS & Android Zero-day Exploits

Crowdfense, a vulnerability research hub announced that they ready to pay $3 million USD per successful submission of iOS and Android zero-day vulnerability exploits. In this year Crowdfense offering a larger...

Docker Hub Hacked – Hackers Gained Access to 190,000 Users Accounts

Docker Hub Hacked, sensitive data more than 190,000 accounts may have exposed. Docker Hub discovered the unauthorized access to a single Hub database On Thursday, April 25th, 2019. Docker hub is...

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by the security...

Important Checklist for Security Leakage Before Initiating Data Migration

Security leakage is a great concern when it comes to data migration. It not only hampers organizational reputation but can jeopardize the privacy of individuals as well. As organizations are...

[NT Conference 2019] Vulnerabilities in Credentials & How to Fix Them

On May 23rd, at the 24th NT Conference in Portorož, Slovenia, you could meet Mike Jankowski-Lorek, our Cloud Security and Database Expert. During his speech, Mike presented the traps of...

Vulnerability in WP Live Chat Plugin Let Hackers to Inject Malicious Script

An Unauthenticated Persistent Cross-Site Scripting vulnerability in WP Live Chat Support WordPress plugin allows hackers to inject malicious JavaScript payloads in the vulnerable website. More than 60,000+ users used the plugin,...

LATEST NEWS

MUST READ