Attackers scanned for the entire IPv4 range and look for Ethereum miners with open SSH connections. Hackers target Ethereum-mining farms in the attempt to hijack the funds by replacing the userâs wallet with their one. The attacks were first spotted on Monday, threat actors attempted to change the default configuration of Ethereum miners. “Illicit digital currency mining, either directly […]
OpenSSL patches two low and medium severity vulnerabilities that were discovered by using Googleâs open source OSS-Fuzz fuzzing service. The medium severity vulnerability tracked as CVE-2017-3736 was addressed with the release of OpenSSL 1.1.0g and 1.0.2m. The flaw is a carry propagating bug in the x86_64 Montgomery squaring procedure, it affects processors that support BMI1, BMI2 and […]
Let’s see what has happened at Mobile Pwn2Own 2017 competition organized by Trend Microâs Zero Day Initiative (ZDI) at the PacSec conference in Tokyo. Here we are discussing once again of the Mobile Pwn2Own competition organized by Trend Microâs Zero Day Initiative (ZDI) at the PacSec conference in Tokyo. White hat hackers earned more than half a million […]
Crooks continue using skimmers in card frauds, these devices are becoming even more sophisticated, last wave of attacks leverages on so-called Shimmers. Crooks continue to skimmers in payment card frauds, these devices are becoming even more sophisticated. The number of cyber attacks against ATM involving so-called âinsert skimmersâ is increasing. Insert Skimmers are wafer-thin fraud devices designed to fit […]
WordPress developers fixed a serious SQL injection vulnerability on Tuesday with the release of version 4.8.3.. Apply it as soon as possible. WordPress developers fixed a serious SQL injection vulnerability that was reported by the researcher Anthony Ferrara, VP of engineering at Lingo Live. The issue was addressed on Tuesday with the release of version 4.8.3. The vulnerability […]
Early this week FireEye released a managed password cracking tool, dubbed GoCrack, that is able to execute tasks across multiple GPU servers. Early this week FireEye released a managed password cracking tool, dubbed GoCrack, that is able to execute tasks across multiple GPU servers. GoCrack is an open source tool developed by FireEye’s Innovation and Custom Engineering […]
A flaw in the Google Issue Tracker, also known as the âBuganizer,â might have exposed details about unpatched flaws listed in the database. A vulnerability in the Google Issue Tracker, also known as the âBuganizer,â might have exposed details about unpatched flaws listed in the database. The flaw was reported by the bug hunter Alex Birsan […]
Gaza Cybergang threat actor it is back again, this time it is targeting organizations in the Middle East and North Africa (MENA) region. Gaza Cybergang is a threat actor that is believed to be linked to the Palestinian organization Hamas, it is back again targeting organizations in the Middle East and North Africa (MENA) region. According to the […]
A serious privacy issue in iPhone that could be exploited by iOS app developers to silently take your photos and record your live video by enabling cameras. Do you use an iPhone? If yes, there is probably something that you need to know about it! The Austrian developer and Google engineer, Felix Krause, has discovered a […]
Mozilla would remove the Dutch CA, the CA of the Staat de Nederlanden, from its trust list due to the new national legal framework. The Dutch Information and Security Services Act will come into force in January 2018 and one of the main effects of the new legal framework is that country’s certificate authority, CA of the […]