As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…
Read MoreAs we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…
Read MoreEver since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the organizations surveyed said that it was still a…
Read MoreWe’ve often heard about it, but what is a SaaS company? SaaS means “Software as a Service,”so basically, this is an organization or a business that hosts a software that…
Read MoreBulgarian authorities arrested an IT expert for demonstrating a flaw in the security of the software used by local kindergartens. This vulnerability allows Petko Petrov to download details of 235,543…
Read MoreElectronic Arts fixes security vulnerabilities in its Origin online gaming platform after security researchers found that they could trick gamers to remotely execute malicious code on their computers The flaw…
Read MoreBrute-force attack cases are considered to be “password list attacks” using a list of leaked IDs and passwords at another site. There are many cases where there is a problem…
Read MoreA critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say that the critical flaw in the popular note-taking extension Evernote could…
Read MoreResearchers discovered a new security vulnerability that affects the confidentiality of data stored in computer memory. This enabled them to successfully extract a signature key with the usual user permissions…
Read MoreMicrosoft warns users about an ongoing email spam campaign that abuses an Office vulnerability and seems to target European users. The malware, it is reported, is spread through infected RTF…
Read MoreConvenience vs Security, that is the frequently recurring theme when it comes to cybersecurity nowadays. Every time a new technology opens its doors to more convenience is when it becomes…
Read More