Breaking News

Hacking SAP POS systems with a $25 Raspberry Pi

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical vulnerability.…

8 years ago

US CERT is warning of potential Hurricane Harvey Phishing Scams

After the Hurricane Harvey hit Texas causing deaths and destructions, authorities are warning of potential Phishing Scams. The US CERT…

8 years ago

India and Pakistan hit by state-sponsored cyber espionage campaign

The security firm Symantec has discovered another cyber espionage campaign against India and Pakistan which is likely to be state-sponsored.…

8 years ago

Chinese APT17 group leverages fake Game of Thrones leaks as lures

Researchers at Proofpoint spotted a cyber espionage campaign leveraging recent Game of Thrones episode leaks and attribute it to Chinese APT17…

8 years ago

Google mistake is the root cause of Internet Outage in Japan

A widespread internet disruption occurred in Japan on Friday, Google error it the main cause of the Internet outage that…

8 years ago

Zimperium researcher released an iOS Kernel Exploit PoC

Zimperium Researcher Adam Donenfeld released an iOS Kernel Exploit PoC that can be used to gain full control of iOS…

8 years ago

Security Affairs newsletter Round 125 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Hackers…

8 years ago

Tor relay of a Brazilian University was banned after harvesting .onions

The Tor relay of a Brazilian University was banned by the Tor administrators because it was spotted collecting the .onion…

8 years ago

Defray Ransomware used in targeted attacks on Education and Healthcare verticals

Researchers at Proofpoint spotted Defray Ransomware, a new ransomware used in a targeted campaign against education and healthcare organizations. Earlier…

8 years ago

More than 1,700 valid Telnet credentials for IoT devices leaked online

Security researchers are warning of the availability online of a list of IoT devices and associated telnet credentials. The list…

8 years ago

This website uses cookies.