Breaking News

Microsoft Windows Applocker circumvented by exploiting native OS utility to remote execute code

The native Windows command-line utility Regsvr32 can be exploited to bypass MS Applocker and run remote code bypassing protection mechanisms.…

10 years ago

MongoDB DB containing 93.4 million Mexican voter records open online

The security expert  Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records.…

10 years ago

Facebook hacked, someone deployed a malicious webshell on its server

Facebook hacked!  The security expert Orange Tsai discovered the presence of a malicious webshell on one of the company servers.…

10 years ago

FBI paid more than $1.3 million to hack into San Bernardino shooter iPhone

FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to…

10 years ago

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

10 years ago

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

10 years ago

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

10 years ago

Cisco Wireless LAN Controller affected by severe flaws. Patch it now

Cisco has released a series of security updates to fix several vulnerabilities in the CISCO Wireless LAN Controller (WLC) products.…

10 years ago

RansomWhere, the free ransomware detection tool for Mac OS X

The former NSA expert Patrick Wardle has designed RansomWhere, a free ransomware detection tool for the protection of Mac OS…

10 years ago

A new strain of Teslacrypt implements sophisticated evasion

The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types.…

10 years ago

This website uses cookies.