Hacking

Security experts released an anti-reconnaissance tool dubbed NetCease

A Microsoft security duo released a new tool dubbed NetCease designed to make hard for attackers to conduct reconnaissance. Microsoft…

9 years ago

33 million records exposed after the Evony data breach

The website and the forum of the Evony gaming company were hacked this summer and as a result 33 Million…

9 years ago

SSHowDowN Proxy attacks – A 12-Year-Old SSH bug exposes more than 2M IoT Devices

Akamai Technologies revealed that hackers are exploiting a 12-year-old bug in OpenSSH to hack into millions of IoT devices with…

9 years ago

Here’s how Tor Project and Mozilla will make harder de-anonymizing Tor users

Tor Project and Mozilla are working together to improve the security of Tor users and make harder for attackers to…

9 years ago

Cisco Meeting Server – CVE-2016-6445 flaw allows to impersonate legitimate users

Cisco fixed a critical vulnerability in the Cisco Meeting Server, tracked as CVE-2016-6445,  that allows remote attackers to impersonate legitimate…

9 years ago

SonicWALL Email Security appliance flaws could expose corporate emails

Dell issued the SonicWALL Email Security OS 8.3.2 release to address high severity issues that can be exploited to take…

9 years ago

Attackers are exploiting a recently patched high-severity DoS flaw in BIND

Attackers are exploiting a recently patched high-severity DoS flaw, tracked as CVE-2016-2776, in the in the popular DNS software in…

9 years ago

Bitcoin Wallet Blockchain.info went down due to a DNS Hijacking

 Blockchain.info, the world's most popular Bitcoin wallet and Block Explorer service went down this week due to a DNS Hijacking…

9 years ago

Patch Tuesday fixes four Microsoft zero-day flaws exploited in the wild

Microsoft October security bulletins patch tens of vulnerabilities, including four Microsoft zero-day vulnerabilities that have been exploited in the wild.…

9 years ago

Inside the DDoS attacks powered by large IoT botnets

Cloudflare firm has published a report that analyzes two recent attacks that were powered by large IoT botnets based on…

9 years ago

This website uses cookies.