Uncategorized

Hackers can remotely control thousands of Sonos and Bose speakers

Security experts at Trend Micro have demonstrated that certain models of Sonos and Bose speakers are affected by vulnerabilities that…

8 years ago

Hackshit PhaaS platform, even more easy to power Phishing campaigns

The experts from Netskope Threat Research Labs discovered the Hackshit PhaaS platform, another interesting case of crimeware-as-a-service. A few days ago,…

9 years ago

Wikileaks revealed CIA Cherry Blossom framework for hacking Wireless devices

WikiLeaks released documents detailing the Cherry Blossom framework which is being used by the CIA cyber spies to hack into…

9 years ago

Microsoft patches two critical remote code execution (RCE) flaws that have been exploited in attacks

Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have…

9 years ago

You can take Shadow Brokers Zero Day Exploit Subscriptions for $21,000 per month

Shadow Brokers is going to launch a monthly subscription model for its data dumps, 0-Day Exploit Subscriptions goes for $21,000…

9 years ago

NATO Locked Shields 2017, world’s largest cyber defence exercise just ended

Locked Shields is the world’s largest and most advanced international technical live-fire cyber defence exercise organized by the NATO since…

9 years ago

The Stuxnet vulnerability is still one of the most exploited flaws in the wild by hackers

A new report published by Kaspersky confirms that Stuxnet exploits targeting a Windows Shell Vulnerability is still widely adopted by…

9 years ago

ATMitch – Crooks stole $800,000 from 8 ATMs in Russia using Fileless Malware

According to Kaspersky Lab, crooks have robbed at least 8 ATMs in Russia and stole $800,000 in just one night…

9 years ago

Flaws in MAC address randomization implemented by vendors allow mobile tracking

Researchers devised a new attack method that can be leveraged to track mobile devices that rely on MAC address randomization…

9 years ago

A bug in Twitter allowed hackers to access to locked accounts until October

A flaw in Twitter allowed attackers to access locked accounts bypassing the locking mechanism implemented by the company. A flaw…

9 years ago

This website uses cookies.