ethicalhackersacademy
Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer

Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer

Television plays a vital role in our day to day life; that's why sticking with television has become one of the entertainment...
Hackers Actively Exploiting a Critical Oracle WebLogic Vulnerability (CVE-2020-14882)

Hackers Actively Exploiting a Critical Oracle WebLogic Vulnerability (CVE-2020-14882)

Recently, many hackers have started investigating all the server those are using the Critical Oracle WebLogic. It is vulnerable to a decisive...
New Chrome 0-Day Bug (CVE-2020-15999) Actively Exploited by Hackers  – Update your Chrome New!!

New Chrome 0-Day Bug (CVE-2020-15999) Actively Exploited by Hackers – Update your Chrome...

Recently, Google released a new version of the Chrome web browser (86.0.4240.111) for Windows, Mac, and Linux, in which Google has patched...
Critical Vulnerability in Facebook Allows to Hack Facebook Page  With a Single Click

Critical Vulnerability in Facebook Allows to Hack Facebook Page With a Single Click

Recently, a critical vulnerability in Facebook was discovered that enables the attackers to hack Facebook pages with a single click. This vulnerability...
Most Exploited Vulnerabilities

List of Top 10 Most Exploited Vulnerabilities 2016 to 2020

Researchers from the Federal Bureau of Investigation (FBI) and the Cybersecurity, Department of Homeland Security (DHS), and Cybersecurity & Infrastructure Security Agency...
Vulnerabilities in Popular Antivirus Softwares Let Attackers to Escalate the System Privileges

Vulnerabilities in Popular Antivirus Softwares Let Attackers to Escalate the System Privileges

Recently, the cybersecurity expert has revealed all the details of security vulnerabilities that are found in popular antivirus solutions that could allow...
Over 247,000 Exchange Servers are Vulnerable to Actively Exploited Bug

Over 247,000 Exchange Servers are Vulnerable to Actively Exploited Bug

Recently, the security experts have reported that over 247,000 exchange servers are vulnerable to actively exploited the bug.
Instagram Vulnerability

Instagram App Vulnerability Let Hackers to Take Control of Your Account Using Malformed Picture

Researchers detected a critical RCE Instagram vulnerability that allows the threat actors to take control of your Instagram account by sending a...
MFA Bypass Bugs Would  Allows Hackers to Access Office 365 Accounts

MFA Bypass Bugs Would Allows Hackers to Access Office 365 Accounts

Researchers from Proofpoint has detected that the MFA bypass bugs that allows the hackers to access office 365 accounts. These are the...
New Raccoon Attack Allow Hackers to Break SSL/TLS Encryption

New Raccoon Attack Allow Hackers to Break SSL/TLS Encryption

Recently, a cybersecurity team has detected that the new Raccoon attack has allowed the attackers to break SSL/TLS encryption. A raccoon is...
ethicalhackersacademy

Recent News