Hacking

Lab test provider LifeLabs disclose a data breach that exposed personal info of 15M customers

Lab test provider LifeLabs has disclosed a data breach that exposed personal information for up to 15 million Canadians. Lab…

6 years ago

Gangnam Industrial Style APT campaign targets industrial firms worldwide

Experts discovered that at least 200 companies were the victims of a campaign, dubbed Gangnam Industrial Style, carried out by…

6 years ago

Dacls RAT, the first Lazarus malware that targets Linux devices

Researchers spotted a new Remote Access Trojan (RAT), dubbed Dacls, that was used by the Lazarus APT group to target…

6 years ago

A WhatsApp bug could have allowed crashing of all group members

WhatsApp fixed a severe bug that could have allowed a malicious group member to crash the messaging app for all…

6 years ago

TP-Link Archer routers allow remote takeover without passwords

TP-Link has addressed a critical vulnerability impacting some TP-Link Archer routers that could allow attackers to login without passwords. TP-Link…

6 years ago

Online Retailer LightInTheBox exposes unsecured DB containing 1.3TB of web server logs

vpnMentor researchers discovered an unsecured server belonging to the Chinese e-store LightInTheBox.com containing 1.3TB of web server logs. Infosec researchers…

6 years ago

A study reveals the list of worst passwords of 2019

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by…

6 years ago

Schneider Electric fixes DoS flaws in Modicon, EcoStruxure products

Schneider Electric addressed several vulnerabilities in some Modicon controllers and several EcoStruxure products. Schneider Electric addresses three denial-of-service (DoS) vulnerabilities…

6 years ago

Experts found binary planting and arbitrary file overwrite flaws in NPM

NPM, the biggest package manager for JavaScript libraries, has addressed a vulnerability that could be exploited to execute "binary planting"…

6 years ago

From iPhone to NT AUTHORITY\SYSTEM – exploit ‘Printconfig’ dll with a real-world example

From iPhone to NT AUTHORITY\SYSTEM - As promised in my previous post, I will show you how to exploit the “Printconfig”…

6 years ago

This website uses cookies.