Hacking

Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. Security…

7 years ago

Google requires 2 years of Android security updates for popular devices

The media outlet The Verge obtained a copy of a contract between Google and OEMs that obliges them to two…

7 years ago

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Researchers discovered a "high" severity command injection vulnerability, tracked as CVE-2018-15442, in Cisco Webex Meetings Desktop. It's time to patch again the…

7 years ago

Cathay Pacific data breach affecting 9.4 million passengers

Cathay Pacific Airways Limited, the flag carrier of Hong Kong, had suffered a major data leak affecting up to 9.4…

7 years ago

Magecart hackers change tactic and target vulnerable Magento extensions

Magecart cybercrime gang made the headlines again, the cyber criminal gang is now targeting vulnerable Magento Extensions. Magecart cybercrime gang switches tactic,…

7 years ago

SandboxEscaper expert is back and disclosed a new Windows Zero-Day

The security researcher SandboxEscaper has released the proof-of-concept exploit code for a new Windows zero-day, Windows users are now exposed to attacks.…

7 years ago

Chalubo, a new IoT botnet emerges in the threat landscape

Security experts from Sophos Labs have spotted a new piece of IoT malware tracked as Chalubo that is attempting to recruit devices…

7 years ago

Russian Government-owned research institute linked to Triton attacks

Security experts from FireEye found evidence that links the development of the Triton malware (aka Trisis and HatMan) to a Russian government…

7 years ago

Message Decryption Key for Signal Desktop application stored in plain text

The reverse engineer researcher Nathaniel Suchy discovered that Signal Desktop application leaves message decryption key in plain text exposing them to an attacker.…

7 years ago

The new Azorult 3.3 is available in the cybercrime underground market

A new version of the Azorult info-stealer appeared in the wild, it is able to steal more data, including other types of…

7 years ago

This website uses cookies.