Unknowns have pwned the Dridex botnet and are using it to spread a legitimate copy of the Avira Antivirus software instead the malicious payload. This story is very intriguing, someone has hacked a portion of the dreaded Dridex botnet and replaced malicious links with references to installers for the Avira Antivirus. The Antivirus company denies […]
A security researcher has released the exploit code for two serious vulnerabilities in the Netgear ProSAFE NMS300 network management system. Do you have a Netgear ProSAFE NMS300 Management System?  Now you have a reason to worry because the security researcher Pedro Ribeiro has discovered two serious vulnerabilities in the network device. The Netgear ProSAFE NMS300 Management System allows […]
The Antivirus firm Malwarebytes is spending a significant effort to fix serious vulnerabilities in its defense solution that was reported by the experts at the Googleâs Project Zero team. The Antivirus firm Malwarebytes is spending a significant effort to fix serious vulnerabilities in its defense solution that was reported by the experts at the Googleâs […]
A former Department of Energy (DoE) employee, Charles Harvey Eccleston [62], has been charged with trying to steal and sell nuclear secrets to foreign governments. A former employee at the Department of Energy (DoE), Charles Harvey Eccleston [62], has pleaded guilty of cyber espionage. The man attempted to infect al least 80 colleagues at the […]
Security Expert discovered that the Comodo Chromodo browser has ‘Same Origin Policy’ (SOP) disabled by default, if you are using it you are at risk. Chromodo is the name of a free browser offered by the Comodo Antivirus firm, it is a customized version of Google’s Chrome browser developed to improve users’ security and privacy. Unfortunately this […]
Cybersecurity Operational Tests And Assessments conducted by the US Defence are essential to improve overall security … and discover that US Govt can’t check F-35 data due to insecure systems. It is difficult to understand the importance of concept like information sharing when dealing with daily work, but officers at the Pentagon are learning at […]
Researchers from Check Point have discovered a flaw affecting the eBay platform that could allow attackers to launch phishing attacks against visitors. A group of researchers from Check Point have discovered a vulnerability affecting the eBay online sales platform that could allow attackers to launch phishing attacks against visitors. Visitors could be tricked into opening […]
A default setting in Apache Web servers can de-anonymize the hidden service allowing an attacker to obtain details on the hosting. An unknown student has discovered a serious issue in Apache Web Server that could potentially de-anonymize .onion-domains and servers hidden behind the Tor-network. The student already reported the issue to the Tor Project development team […]
Anonsec group hacked NASA network and released a data dump of data online. The hackers also hijacked a Global Hawk drone. Hackers belonging to the AnonSec group have released online 250GB of data stolen from systems at the NASA, the hackers revealed to have hijacked a drone the Agency uses to run high-altitude testing and sampling […]
Security experts at FireEye are warning attackers can exploit the JSPatch hot patching technique to serve malicious code and put iOS users at risk The release of hot patches for apps already deployed in the official App Store is a time-consuming procedure that results frustrating for developers. Apple is aware of this drawback, for this reason […]