Hacking

Apache Foundation rejects allegation Equifax hackers exploited CVE-2017-9805 in Struts

Media and experts speculate Equifax Hack was the result of the exploitation of the recently discovered critical vulnerability CVE-2017-9805 in…

8 years ago

Hackers can remotely access Smiths Medical Syringe Infusion Pumps to kill patients

The US-CERT is warning of hackers can remotely access Smiths Medical Syringe Infusion Pumps to control them and kill patients.…

8 years ago

Toast Overlay attacks, a Cloak and Dagger with No Permissions, fixed by Google

Google just fixed a high-severity Android vulnerability, tracked as CVE-2017-0752, that ties with the Toast Overlay attacks. Security researchers with…

8 years ago

Member of the ‘Crackas With Attitude’ who hacked US intel officials has been sentenced to 5 years in jail

A member of the hacker group 'Crackas With Attitude' who hacked US intel officials has been sentenced to 5 years in…

8 years ago

Microsoft confirmed it won’t fix kernel issue that could be exploited to evade antivirus

A design flaw within the Windows kernel could be exploited by attackers to evade antivirus and stop them from recognizing…

8 years ago

Experts observed the active exploitation of the CVE-2017-9805 Struts vulnerability

Hackers are exploiting in the wild a critical remote code execution vulnerability in Apache Struts 2, tracked as CVE-2017-9805, that was patched…

8 years ago

Hacker Interview – Jonturk 75 – JRB

Today I have the pleasure to interview Jonturk 75 one of the hackers that hit high profile targets, including the notorious hacker…

8 years ago

DolphinAttack – Hackers control Siri, Google Now, Alexa voice assistants with ultrasound

The DolphinAttack technique allows hackers to control Siri, Google Now, Alexa and other voice assistants with commands in ultrasonic frequencies.…

8 years ago

PC-Wahl software used in Germany for vote counting lack of security

The European biggest hacker collective Chaos Computer Club demonstrated that PC-Wahl software used in Germany for vote counting is insecure.…

8 years ago

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive…

8 years ago

This website uses cookies.