Hacking

SpectreRSB – new Spectre CPU side-channel attack using the Return Stack Buffer

Researchers from the University of California, Riverside (UCR) have devised a new Spectre CPU side-channel attack called SpectreRSB. SpectreRSB leverage the speculative…

8 years ago

Sony addresses remotely exploitable flaws in Sony IPELA E Network Cameras

Sony fixed 2 remotely exploitable flaws in Sony IPELA E Series Network Camera products that could be exploited to execute commands…

8 years ago

TA505 gang abusing PDF files embedding SettingContent-ms to distribute FlawedAmmyy RAT

Proofpoint uncovered a massive malspam campaign leveraging emails delivering weaponized PDF documents containing malicious SettingContent-ms files. Security experts from Proofpoint…

8 years ago

Trump-Putin Meeting was the root cause of a spike of cyber attacks against Finland

F5 experts observed a spike in the attacks in the days prior to the Trump-Putin meeting on July 16 that…

8 years ago

SingHealth, largest healthcare group in Singapore, suffered a massive data breach

SingHealth, the largest healthcare group in Singapore, suffered a massive data breach that exposed 1.5 Million patient records. The largest…

8 years ago

Experts disclose dangerous flaws in robotic Dongguan Diqee 360 smart vacuums

Positive Technologies discovered two flaws affecting Dongguan Diqee 360 smart vacuums that can be used to perform video surveillance. Security researchers from…

8 years ago

MoneyTaker hacking group stole 1 million US dollars from Russian PIR Bank

The cybersecurity firm Group-IB is involved in the incident response on an attack on the Russian PIR Bank conducted by MoneyTaker…

8 years ago

Thousands of Mega account credentials leaked online, it is credential stuffing

Thousands of account credentials associated with the popular file storage service Mega have been published online, The former NSA hacker…

8 years ago

Cisco fixes critical and high severity flaws in Policy Suite and SD-WAN products

Cisco has found over a dozen critical and high severity vulnerabilities in its Policy Suite, SD-WAN, WebEx and Nexus products.…

8 years ago

How crooks conduct Money Laundering operations through mobile games

Experts uncovered a money laundering ring that leverages fake Apple accounts and gaming profiles to make transactions with stolen payment…

8 years ago

This website uses cookies.