Breaking News

ICS-CERT warns of critical flaws in NetComm industrial routers

Security researcher has found two critical vulnerabilities in the industrial routers manufactured by the Australian company NetComm Wireless. Security researcher…

8 years ago

Faxploit – Critical flaws potentially exposes millions of HP OfficeJet Printers to hack

A vulnerability in HP OfficeJet all-in-one inkjet printer can be exploited by attackers to gain control of the printer and…

8 years ago

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score…

8 years ago

Apple zero-day exposes macOS to Synthetic Mouse-Click attacks

Patrick Wardle, the popular white hat hacker, has discovered a zero-day vulnerability that could allow attackers to carry out synthetic…

8 years ago

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking.…

8 years ago

Security Affairs newsletter Round 175 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

8 years ago

Unsecured AWS S3 Bucket exposed sensitive data on 31,000 GoDaddy servers

UpGuard discovered an unsecured GoDaddy's Amazon S3 bucket containing sensitive information related to more than 31,000 GoDaddy systems. Experts at…

8 years ago

Quiet Skies, TSA surveillance program targets Ordinary U.S. Citizens

Journalists revealed a new surveillance program that targets US citizens, the program was previously-undisclosed and code named 'Quiet Skies'. According…

8 years ago

Group-IB: The Shadow Market Is Flooded with Cheap Mining Software

Group-IB is recording new outbreaks of illegal mining (cryptojacking) threats in the networks of commercial and state organizations. Group-IB, an international…

8 years ago

Experts explained how to hack macs in enterprises through MDM

Researchers demonstrated how a sophisticated threat actor can hack a brand new Apple Mac computer in enterprise environments through MDM.…

8 years ago

This website uses cookies.