Hacking

August 2018 Microsoft Patch Tuesday fixes two flaws exploited in attacks in the wild

Microsoft Patch Tuesday update for August 2018 addresses a total of 60 vulnerabilities, two of which are actively exploited in…

7 years ago

Key Reuse opens to attacks on IPsec IKE, Cisco, Huawei, ZyXEL products are affected

Security expert demonstrated that reusing a key pair across different versions and modes of IPsec IKE open the doors to…

7 years ago

ICS-CERT warns of critical flaws in NetComm industrial routers

Security researcher has found two critical vulnerabilities in the industrial routers manufactured by the Australian company NetComm Wireless. Security researcher…

7 years ago

Faxploit – Critical flaws potentially exposes millions of HP OfficeJet Printers to hack

A vulnerability in HP OfficeJet all-in-one inkjet printer can be exploited by attackers to gain control of the printer and…

7 years ago

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score…

7 years ago

Apple zero-day exposes macOS to Synthetic Mouse-Click attacks

Patrick Wardle, the popular white hat hacker, has discovered a zero-day vulnerability that could allow attackers to carry out synthetic…

7 years ago

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking.…

7 years ago

Security Affairs newsletter Round 175 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

7 years ago

Experts explained how to hack macs in enterprises through MDM

Researchers demonstrated how a sophisticated threat actor can hack a brand new Apple Mac computer in enterprise environments through MDM.…

7 years ago

The analysis of the code reuse revealed many links between North Korea malware

Security researchers at Intezer and McAfee have conducted a joint investigation that allowed them to collect evidence that links malware…

7 years ago

This website uses cookies.