Hacking

Microsoft found a new bug that allows bypassing SIP root restrictions in macOS

Apple fixed a vulnerability discovered by Microsoft researchers that lets attackers with root privileges bypass System Integrity Protection (SIP). Researchers…

3 years ago

A database containing 478,000 RaidForums members leaked online

The database of the popular RaidForums hacking forum has been leaked on a new hacking forum, 478,000 members exposed. A…

3 years ago

Beware of the new phishing technique “file archiver in the browser” that exploits zip domains

"file archiver in the browser" is a new phishing technique that can be exploited by phishers when victims visit a…

3 years ago

BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint

Researchers devised an attack technique, dubbed BrutePrint Attack, that allows brute-forcing fingerprints on smartphones to bypass authentication. Researchers have devised…

3 years ago

New Go-written GobRAT RAT targets Linux Routers in Japan

A new Golang remote access trojan (RAT), tracked as GobRAT, is targeting Linux routers in Japan, the JPCERT Coordination Center warns.…

3 years ago

Researchers analyzed the PREDATOR spyware and its loader Alien

Cisco Talos and the Citizen Lab researchers have published a technical analysis of the powerful Android spyware Predator. Security researchers…

3 years ago

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Experts warn of phishing attacks that are combining the use of compromised Microsoft 365 accounts and .rpmsg encrypted emails. Trustwave…

3 years ago

CISA adds recently patched Barracuda zero-day to its Known Exploited Vulnerabilities catalog

US CISA added recently patched Barracuda zero-day vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency…

3 years ago

Is the BlackByte ransomware gang behind the City of Augusta attack?

The city of Augusta in Georgia, U.S., admitted that the recent IT system outage was caused by a cyber attack. While…

3 years ago

New Buhti ransomware operation uses rebranded LockBit and Babuk payloads

The recently identified Buhti operation targets organizations worldwide with rebranded LockBit and Babuk ransomware variants. Researchers from Symantec discovered a…

3 years ago

This website uses cookies.