Remote Code Execution Vulnerability in Popular Windows Software

A popular windows file archive and compression tool has a high severity zero day vulnerability that could allow hackers to gain control of your computer. The flaw is tracked as CVE-2023-40477 and it affects the WinRAR utility. WinRAR is a popular file archiver for...

Australian Critical Infrastructure Suffers Data Breach

Australia’s internet domain administrator, auDA, might have suffered a data breach. The organisation was alerted to an alleged data breach last Friday afternoon and had initially denied it was affected after it found no evidence of such an event from their...

LinkedIn Account Takeover Campaign

There is currently an active campaign by hackers to take over LinkedIn accounts. This has resulted in victims being pressured into paying to regain control of their account or facing permanent deletion. Security research company, Cyberint has observed an ongoing and...

Cybercrime Forums Selling Personal Information of Hackers

Info stealing malware do not discriminate when it is stealing personal information. Security researchers, discovered that some of the information stolen are also from hackers. Security researchers analysing stolen data from 100 of the leading cybercrime forums found...
How Leaky is your VPN?

How Leaky is your VPN?

A two decades old vulnerability has been discovered which results in exposing encrypted VPN traffic. And every VPN product is vulnerable on at least one device. The academic researchers have called the attack TunnelCrack and have published proof of concept exploit...