Hacking

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Group-IB, a Singapore-based cybersecurity company, observed the growth of the lifespan of phishing attacks in the second half of 2019. This…

6 years ago

Massive cyber attack forced Ruhr University Bochum (RUB) to shut down its IT infrastructure

Ruhr University Bochum (RUB) shuts down a large portion of its central IT infrastructure between May 6 and May 7,…

6 years ago

Cisco fixes High Severity issues in ASA and FTD products

Cisco addresses tens of flaws in multiple products, including 12 high severity issues in Adaptive Security Appliance and Firepower Threat…

6 years ago

Issues in Elementor Pro and Ultimate Addons for Elementor exposed 1 Million WordPress sites at risk

Attackers exploited two security issues in the Elementor Pro and Ultimate Addons for Elementor WordPress plugins to fully compromise over 1M…

6 years ago

Samsung fixes a zero-click issue affecting its phones

Samsung addressed this month a critical 0-click vulnerability that was discovered by security researchers from Google. Samsung released this week…

6 years ago

Law enforcement agencies dismantled Infinity Black hacker group

Europol arrested five members of the Infinity Black hacker group that were selling stolen user credentials and hacking tools. Europol…

6 years ago

Recorded Future to Provide Free Access to Elite Intelligence Through New Browser Extension

Level up Your Security Program With the Same Security Intelligence Used by the World's Largest Governments and Many of the…

6 years ago

Expert released PoC exploit for CVE-2020-1967 DoS flaw in OpenSSL

A proof-of-concept (PoC) exploit for the recently fixed CVE-2020-1967 denial-of-service (DoS) issue in OpenSSL has been made public. Recently, the…

6 years ago

Kaiji, a new Linux malware targets IoT devices in the wild

Security researchers spotted a new piece of DDoS bot dubbed Kaiji that is targeting IoT devices via SSH brute-force attacks.…

6 years ago

Microsoft spotted multiple malspam campaigns using malware-laced ISO and IMG files

Microsoft warns of threat actors targeting organizations with malware-laced ISO and IMG files aimed at delivering a remote access trojan.…

6 years ago

This website uses cookies.