Satoshi Nakamoto Blog

Category : Vulnerability

Buffer Overflow Cyber cybersecurity linux NEWS operating system Security The-Latest Vulnerability

Long-unnoticed Linux vulnerability may enable hackers to attack devices over Wi-Fi

A six-year-old bug in the Linux kernel could enable hackers to crash and, under certain circumstances, potentially compromise devices running Realtek Semiconductor Corp.’s Wi-Fi chips....
adobe Adobe Acrobat adobe software update cyber security download software update patch download patch Tuesday remote code execution Software vulnerabilities Vulnerability

Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products

No, it’s not a patch Tuesday. It’s the third Tuesday of the month, and as The Hacker News shared an early heads-up late last week...
cyber security hacking sim cards mobile phone hacking Sim hacking SimJacker smartphone hacking track mobile track phone number Vulnerability

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

Until now, I’m sure you all might have heard of the SimJacker vulnerability disclosed exactly a month ago that affects a wide range of SIM...
download software update Microsoft Microsoft Patch Tuesday Microsoft update patch Tuesday software update Vulnerability windows update download

Microsoft Releases October 2019 Patch Tuesday Updates

Microsoft today rolling out its October 2019 Patch Tuesday security updates to fix a total of 59 vulnerabilities in Windows operating systems and related software,...
cyber security forum software hacking forum Hacking News remote code execution SQL injection attack VBulletin vBulletin Forum Vulnerability

vBulletin Releases Patch Update for New RCE and SQLi Vulnerabilities

After releasing a patch for a critical zero-day remote code execution vulnerability late last month, vBulletin has recently published a new security patch update that...
Android Vulnerability call hacking Hacking News Private Chat Secure Messenger signal messaging app Vulnerability

Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers’ Interaction

Almost every application contains security vulnerabilities, some of which you may find today, but others would remain invisible until someone else finds and exploits them—which...
Android Android Vulnerability Cyber Attack hacking android phone Hacking News how to hack android Vulnerability Zero-Day Vulnerability

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world’s most widely used mobile operating system, Android. What’s more? The...