Hacking

Wikileaks: CIA HighRise Android malware used to intercept and redirect SMSs

Wikileaks released the documentation for HighRise, an Android app used by the CIA to intercept and redirecting SMS messages to…

9 years ago

MS Patch Tuesday fixes 19 critical issues, including two NTLM zero-day flaws

As part of the Microsoft Patch Tuesday, the tech giant fixed two critical flaws in Windows NTLM Security Protocol. Users…

9 years ago

Katyusha Scanner, a new SQLi Vulnerability Scanner Available for $500 in the underground

Katyusha Scanner is a new fully automated SQLi vulnerability scanner discovered by researchers at security firm Recorded Future. Recorded Future…

9 years ago

SAP Security Notes fixes SAP POS flaw potentially affecting 500 billion installations

SAP has released its SAP Security Notes for July 2017 that includes 23 patches, the most severe is a SAP…

9 years ago

Do you use Adobe Flash Player? You should update it now!

Adobe released new versions of Flash Player and Connect web conferencing software to fix important and critical vulnerabilities. According to…

9 years ago

Adwind RAT is back, crooks are targeting Aerospace industries in many countries

Security experts at TrendMicro discovered that the notorious Adwind RAT has resurfaced targeting enterprises in the Aerospace industries worldwide. Crooks are even…

9 years ago

Cloud Foundry has disclosed a privilege escalation flaw in User Account and Authentication software

The Open source devops platform Cloud Foundry fixed a bug that affects its User Account and Authentication server software. The…

9 years ago

FBI and DHS warn of targeted attacks on US Nuclear Facilities

Since May, APT actors have been penetrating the networks of US companies that operate nuclear facilities and that works in…

9 years ago

Experts found an unpatched flaw in Humax WiFi Router model HG-100R

Experts found a flaw in Humax WiFi Router model HG-100R that could be triggered to fully compromise the devices. A…

9 years ago

GMR-2 issues allow satellite phone communications decryption in near real-time

Researchers have exploited vulnerabilities in the implementation of the GMR-2 cipher decrypt satellite phone communications in fractions of a second. Two…

9 years ago

This website uses cookies.