Hacking

New Miori botnet has a unique protocol for C2 communication

A new variant of the implements a unique protocol to communicate with Command and Control infrastructure A new variant of…

6 years ago

Hackers stole $32 million from Bitpoint cryptocurrency exchange

BITPoint Japan-based cryptocurrency announced that hackers have stolen more than $32 million (3.5 billion yen) worth of cryptocurrency due to…

6 years ago

CVE-2019-1132 Windows Zero-Day exploited by Buhtrap Group in government attack

The CVE-2019-1132 flaw addressed by Microsoft this month was exploited by Buhtrap threat actor to target a government organization in…

6 years ago

Agent Smith Android malware already infected 25 million devices

'Agent Smith' is a new malware discovered by Check Point researchers that replaces legit Android Apps with malicious ones that…

6 years ago

Intel addresses high severity flaw in Processor Diagnostic Tool

Intel Patch Tuesday updates for July 2019 address a serious flaw in Processor Diagnostic Tool and minor issue in the…

6 years ago

A new NAS Ransomware targets QNAP Devices

Malware researchers at two security firms Intezer and Anomali have discovered a new piece of ransomware targeting Network Attached Storage…

6 years ago

Kali Linux is now available for Raspberry Pi 4

The popular operating system Kali Linux is finally available for Raspberry Pi 4, this is great news for hackers and…

6 years ago

Severe vulnerabilities allow hacking older GE anesthesia machines

The news is disconcerting, security experts have found vulnerabilities in two models of anesthesia machines commercialized by General Electric. General…

6 years ago

Prototype Pollution flaw discovered in all versions of Lodash Library

Liran Tal, a developer advocate at open-source security platform Snyk, discovered a high-severity prototype pollution security flaw that affects all…

6 years ago

Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when…

6 years ago

This website uses cookies.