The patch for the critical Java CVE-2013-5838 vulnerability released by Oracle in 2013 is ineffective and can be easily bypassed. Bad news for Java users, in 2013 Oracle released a patch to fix theĀ CVE-2013-5838 vulnerability, but security experts discovered that it could be easily bypassed to compromise the latest versions of the software. This means […]
Investigators suspect the attackers behind the Bangladesh central bank ‘s hack have used a malware to gather information for the Fed’s heist. One of most intriguing stories this week is theĀ hack ofĀ the Bangladesh account at theĀ Federal Reserve Bank of New York. The Bangladeshās Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal Reserve of […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Anonymous hacked the Donald Trump ās voicemails The popular Romanian Hacker Guccifer will be extradited to US soon Operation Transparent Tribe targets Indian diplomats and military Which are principal cybercriminal ecosystems in the Deep Web? KeRanger, the […]
Cisco released a series of software updates to patch several high severity flaws in its cable modems, residential gateways and security appliances. Cisco just patched critical vulnerabilities in itsĀ cable modems, residential gateways and security appliances. The security updates released this week fix serious flaws inĀ Cisco residential reported by Kyle Lovett, and Chris Watts from Tech […]
Experts at Trustwave observed a new massive spam campaign that was sending a JavaScript attachment that downloads Locky ransomware. Ransomware continues to be among most insidious threats in this first part of the year, security researcher have recently observed a spike in the number of Locky ransomwareĀ infections. The experts from Trustwave security firm highlighted the […]
The Defense Advanced Research Projects Agency is launching a new project dubbed Improv that aims to develop new techniques to hack into everyday technology. TheĀ IoTĀ paradigm is enlarging as never before our surface of attack, it is obvious that cyber criminals and nation-state hackers are looking at it with an increasing interest. The US Military Defense […]
A report published by the DoD Inspector General revealed that military drones have been used for Non-Military domestic Surveillance. The US Government has admitted the use ofĀ dronesĀ for operations of domesticĀ surveillance. The US Military clarified that all the operations were authorized by a regular warrant confirming thatĀ no legalĀ violations were found. The news was revealed by theĀ USA […]
Hackers who allegedly infiltrated the Federal Reserve Bangladesh’s account were attempting to steal almost $1 billion, but typos thwarted the plan. This week the principal news agencies shared the news of the hack ofĀ the Bangladesh account at theĀ Federal Reserve Bank of New York. The Bangladeshās Finance Minister Abul Maal Abdul Muhith accused the U.S. Federal […]
An attacker who manages to get access to a user’s configuration file for SAP Download Manager might be able to obtain the stored proxy password. Are you a SAP user? Do you use the SAP Download Manager that allows downloading of software packages and support notes? You urgently need to update it in orderĀ to fix […]
Adobe has released an emergency out-of-band update to fix a zero-day vulnerability that is being used in targeted attacks. It’s happened again, Adobe hasĀ Issued an emergency Out-of-Band update For Flash Zero-Day that is being exploited in targeted attacks. The unfortunate thing is that theĀ Out-of-Band Patch For Flash Zero-Day comes just a couple of days after […]