Hacking

Cisco addresses three high-severity issues in Webex, IP Cameras and ISE

Cisco fixed three high-severity flaws in Webex video conferencing system, Video Surveillance 8000 Series IP Cameras and Identity Services Engine.…

5 years ago

Hacker who helped the ISIS will remain in US prison

The hacker who shared with the ISIS personal data of more than 1,300 U.S. government and military personnel will remain in…

5 years ago

MontysThree threat actor targets Russian industrial organizations

A previously unknown threat actor, tracked as MontysThree, composed of Russian speaking members targets Russian industrial organizations. Kaspersky Lab researchers…

5 years ago

Kraken fileless attack technique abuses Microsoft Windows Error Reporting (WER)

An unidentified group of hackers is using a new fileless attack technique, dubbed Kraken, that abuses the Microsoft Windows Error…

5 years ago

New HEH botnet wipes devices potentially bricking them

A new botnet, tracked as HEH, discovered botnet implements a disk-wiping feature that allows it to wipe all data from…

5 years ago

Using a WordPress flaw to leverage Zerologon vulnerability and attack companies’ Domain Controllers

Using a WordPress flaw (File-Manager plugin–CVE-2020-25213) to leverage Zerologon (CVE-2020-1472) and attack companies’ Domain Controllers. Recently, a critical vulnerability called…

5 years ago

A sophisticated cyberattack hit the International Maritime Organization (IMO)

The United Nations International Maritime Organization (IMO) disclose a cyber attack that disrupted its IT systems. The United Nations International…

5 years ago

Fullz House hacked the website of Boom! Mobile provider to steal credit cards

The credit card skimming group Fullz House has compromised the website of US mobile virtual network operator (MVNO) Boom! Mobile. The…

5 years ago

Iran-linked APT is exploiting the Zerologon flaw in attacks

Microsoft researchers reported that Iranian cyber espionage group MuddyWater is exploiting the Zerologon vulnerability in attacks in the wild. Microsoft…

5 years ago

Second-ever UEFI rootkit used in North Korea-themed attacks

A China-linked threat actor used UEFI malware based on code from Hacking Team in attacks aimed at organizations with an interest in…

5 years ago

This website uses cookies.