Security

Flaws in DTM components are threatening security of critical Industrial Control Systems

Researchers at the last Black Hat Europe have presented the results of their research on DTM/FDT components, demonstrating the presence…

10 years ago

Smart meters in Spain can be hacked to hit the National power network

Two researchers analyzed Smart meters widely used in Spain and discovered that can be hacked by attackers to harm the…

10 years ago

Same Origin Method Execution attack to perform unintended actions on a website on behalf of victims

A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…

10 years ago

South Korea need to overhaul the national ID system

ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years…

10 years ago

Microsoft Fixes 3 Zero-day and many other flaws being exploited in the Wild

Microsoft has released 8 security bulletins as part of October 2014 Patch Tuesday, it patches 3 Zero-day flaws actively being…

10 years ago

POODLE attack on SSL menaces Internet, it’s time to disable it by default

The POODLE against SSL 3.0. A new attack on SSL is threatening the Internet again, it allows bad actors to decrypt…

10 years ago

ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months.…

10 years ago

SandWorm hacking team exploited 0-day against NATO and other Government entities

iSIGHT Partners firm uncovered a Russian hacking team dubbed Sandworm that was running a cyber espionage campaign on NATO and…

10 years ago

WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks…

10 years ago

Threat actors phishing for Intellectual property and source code from IT giants

FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to…

10 years ago

This website uses cookies.