Hacking

China used the Great Cannon DDoS Tool against forum used by Hong Kong protestors

China is accused to have used the "Great Cannon" DDoS tool to launch attacks against LIHKG, a forum used by Hong…

6 years ago

Iran-Linked APT groups target energy, industrial sectors with ZeroCleare Wiper

Experts spotted a piece of malware dubbed ZeroCleare that has been used in highly targeted attacks aimed at energy and…

6 years ago

Two malicious Python libraries were stealing SSH and GPG keys

The Python security team removed two trojanized Python libraries from PyPI (Python Package Index) that were stealing SSH and GPG…

6 years ago

Mozilla removed 4 Avast and AVG extensions for spying on Firefox users

Mozilla has removed four extensions from Avast and AVG from the Firefox site that are suspected to track user activity…

6 years ago

Talos experts found a critical RCE in GoAhead Web Server

Experts at Cisco Talos found two vulnerabilities in the GoAhead embedded web server, including a critical remote code execution flaw.…

6 years ago

A flaw in Microsoft OAuth authentication could lead Azure account takeover

A vulnerability in the Microsoft OAuth implementation exposes Azure cloud accounts to takeover. The vulnerability affects the way Microsoft applications…

6 years ago

Website of gunmaker Smith & Wesson hit by a Magecart attack

The US gunmaker Smith & Wesson was hacked late last month in a Magecart attack, attackers injected a malicious software…

6 years ago

Experts discovered DLL hijacking issues in Kaspersky and Trend Micro solutions

Experts discovered several DLL hijacking flaws in Kaspersky Secure Connection, Trend Micro Maximum Security, and Autodesk Desktop Application. Researchers from…

6 years ago

Ohio Election Day cyber attack attempt traced Russian-Owned Company

Ohio detected and neutralized a cyber attack against its election systems earlier this month, it was traced to a Russian-owned…

6 years ago

StrandHogg Vulnerability exploited by tens of rogue Android Apps

Security experts disclosed a vulnerability dubbed StrandHogg that has been exploited by tens of malicious Android apps. Security experts at…

6 years ago

This website uses cookies.