Hacking

Watch out, the Riddle vulnerability affects some Oracle MySQL versions. Update them now

A bug dubbed Riddle vulnerability affecting MySQL 5.5 and 5.6 clients exposed user credentials to MiTM attacks. Update to version 5.7.…

9 years ago

Shadows Brokers released another archive that suggests NSA compromised a SWIFT system

The Shadow Brokers group released a 117.9 MB encrypted dump containing documents that suggest NSA hacker SWIFT system in the…

9 years ago

Cisco warns of two critical issues in IOS and Apache Struts

Cisco issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, another for a flaw affecting…

9 years ago

CVE-2016-10229 Linux remote code execution flaw potentially exposes systems at risk of hack

The Linux remote vulnerability tracked as CVE-2016-10229 poses Linux systems at rick of hack if not patched. A Linux kernel vulnerability,…

9 years ago

Hundreds of thousands Magento e-shops are exploited to hack due to an unpatched flaw

An unpatched vulnerability in Magento platform could be exploited by hackers to compromise fully web servers that host the e-commerce…

9 years ago

CVE-2017-0199 Zero Day exploit used to deliver FINSPY spyware

Security researchers at FireEye discovered that the Microsoft Word CVE-2017-0199 exploit was linked to cyberspying in Ukraine conflict. The zero-day…

9 years ago

Critical bug in SAP TREX affects SAP HANA and other applications

SAP has issued a security patch for the SAP TREX search engine that addresses also a two-years old critical vulnerability.…

9 years ago

Tens of thousands of compromised routers abused in WordPress attacks

Hackers exploited the CVE-2014-9222 flaw, also known as 'Misfortune Cookie', to hack thousands of home routers and abuse them for…

9 years ago

Hackers can steal PINs and Passwords capturing data from smartphone sensors

A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile…

9 years ago

Watch out! Shadow Brokers dump includes remote root exploits for Solaris boxes

The security expert Matthew Hickey has discovered two tools dubbed EXTREMEPARR and EBBISLAND which were specifically designed to target Solaris…

9 years ago

This website uses cookies.