Hacking

Hackers spied on a US Congressman’s communication abusing the SS7 protocol

Security experts eavesdropped and geographic tracked a US Congressman only using his phone number by abusing the SS7 protocol. Hackers…

10 years ago

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security…

10 years ago

IBM warns a spike in the number of PHP C99 Webshell Attacks

IBM Security has warned the WordPress community about a spike in the number of attacks leveraging a specific variant of…

10 years ago

Experts discovered a number of flaws in the Avactis PHP Shopping Cart

A group of experts at VoidSec used a Grey Box approach to assess the security posture of some important aspects…

10 years ago

PhineasFisher explained how he breached the Hacking Team

The hacker PhineasFisher published a detailed explanation of how he has hacked the Italian surveillance firm Hacking Team. In July…

10 years ago

Lottery security director hacked random-number generator to rig lotteries

New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year.…

10 years ago

Europol and Italian Carabinieri an international ATM Skimming network

The Italian law enforcement corp Carabinieri and the Europol have dismantled an international criminal group responsible for large-scale ATM skimming.…

10 years ago

Watch out! URL shorteners could leak sensitive content

Two security researchers from Cornell Tech discovered that web URL shorteners operate in predictable way exposing sensitive data. The security…

10 years ago

Urgent, Uninstall QuickTime for Windows Now

Apple abandons the support for the Windows version of quicktime, everyone should follow Apple’s guidance to uninstall it to avoid…

10 years ago

JBOSS Backdoor opens 3 million servers at risk of attacks

Experts at Cisco Systems discovered more than 3 million vulnerable servers exposed on the Internet while scanning for the presence…

10 years ago

This website uses cookies.