Hacking

13 flaws in Nagios IT Monitoring Software pose serious risk to orgs

Researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be exploited for malicious purposes. Cybersecurity…

5 years ago

Foreign hackers breached Russian federal agencies, said FSB

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. A…

5 years ago

Report: how cybercriminals abuse API keys to steal millions

CyberNews researchers found that crooks could abuse cryptocurrency exchange API keys and steal cryptocurrencies. Original post available here: https://cybernews.com/security/report-how-cybercriminals-abuse-api-keys-to-steal-millions/ CyberNews…

5 years ago

Microsoft SimuLand, an open-source lab environment to simulate attack scenarios

Microsoft released SimuLand, an open-source tool that can be used to build lab environments to simulate attacks and verify their…

5 years ago

Blind SQL Injection flaw in WP Statistics impacted 600K+ sites

Experts discovered a Time-Based Blind SQL Injection vulnerability in the WP Statistics plugin which is installed on over 600,000 WordPress…

5 years ago

Hacking the infotainment system used in Mercedes-Benz cars

Security researchers identified five vulnerabilities in the infotainment system in Mercedes-Benz cars, four of them are remotely exploitable. Security researchers…

5 years ago

Expert released PoC exploit code for Windows CVE-2021-31166 bug

A security researcher has published a working proof-of-concept exploit code for a wormable Windows IIS server vulnerability tracked as CVE-2021-31166.…

5 years ago

QNAP warns of eCh0raix ransomware and Roon Server zero-day attacks

QNAP warns of an actively exploited Roon Server zero-day flaw and eCh0raix ransomware attacks on its NAS devices. QNAP warns…

5 years ago

Magecart gang hides PHP-based web shells in favicons

Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript…

5 years ago

FragAttacks vulnerabilities expose all WiFi devices to hack

Security researcher discovered a series of flaws, collectively tracked as FragAttacks, that impact the WiFi devices sold for the past…

5 years ago

This website uses cookies.