Hacking

“Collection #1” Data Breach Analysis – Part 2

The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some…

7 years ago

Microsoft Exchange zero-day and exploit could allow anyone to be an admin

The security expert Dirk-jan Mollema with Fox-IT discovered a privilege escalation vulnerability in Microsoft Exchange that could be exploited by…

7 years ago

DHS issues emergency Directive to prevent DNS hijacking attacks

DHS has issued a notice of a CISA emergency directive urging federal agencies of improving the security of government-managed domains…

7 years ago

Expert shares PoC exploit code for remote iOS 12 jailbreak On iPhone X

Researcher published a PoC exploit code for critical vulnerabilities that could be chained to implement an iOS jailbreak On iPhone…

7 years ago

PHP PEAR official site hacked, tainted package manager distributed for 6 months

PHP PEAR official site hacked, attackers replaced legitimate version of the package manager with a tainted version in the past…

7 years ago

Hacker threatened a family using a Nest Camera to broadcast a fake missile attack alert

Nest recommended the owners of its security cameras to use enhanced authentication to avoid being hacked as happened with a…

7 years ago

0patch releases unofficial security patches for 3 Windows flaws yet to be fixed

Researchers from 0patch, a community of experts that aims at addressing software flaws, released unofficial patches for three Windows vulnerabilities that…

7 years ago

Critical flaw in Linux APT package manager could allow remote hack

Expert discovered a remote code execution vulnerability in the APT package manager used by several Linux distributions, including Debian and…

7 years ago

Did you win at online casinos? Watch out, your data might have had exposed online

Data belonging to online casinos found exposed online on unprotected Elastic search instance, it includes info on 108 million bets…

7 years ago

A flaw in MySQL could allow rogue servers to steal files from clients

A rogue MySQL server could be used to steal files from clients due to a design flaw in the popular…

7 years ago

This website uses cookies.