Breaking News

Shellbot Botnet Targets IoT devices and Linux servers

Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot. The malware was distributed…

7 years ago

New attack by Anonymous Italy: personal data from ministries and police have been released online

New attack by Anonymous Italy: personal data from ministries and police have been released online. The site of Fratelli d’Italia,…

7 years ago

Google dorks were the root cause of a catastrophic compromise of CIA’s communications

Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens…

7 years ago

Flaw in Icecast streaming media server allows to take off online Radio Stations

Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast…

7 years ago

High severity XML external entity flaw affects Sauter building automation product

A security researcher has found a serious vulnerability in a building automation product from Sauter AG that could be exploited to steal…

7 years ago

USB drives are primary vector for destructive threats to industrial facilities

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published…

7 years ago

PortSmash flaw in Hyper-Threading CPU could allow sensitive data theft

PortSmash side-channel flaw that could be exploited with a timing attack to steal information from other processes running in the…

7 years ago

Apple T2 security chip in new MacBooks disconnects Microphone when lid is closed

Apple has implemented a new feature to protect the privacy of its MacBooks users aimed at preventing malicious software from spying on…

7 years ago

Security Affairs newsletter Round 187 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

7 years ago

Kraken ransomware 2.0 is available through the RaaS model

The author of the infamous Kraken ransomware has released a new version of the malicious code and launched a RaaS…

7 years ago

This website uses cookies.