Malware campaign uses multiple propagation methods, including EternalBlue

7 years ago

Hackers are using the EternalBlue exploit and leveraging advantage of Living off the Land (LotL) obfuscated PowerShell-based scripts to deliver…

Siemens addressed several DoS flaws in many products

7 years ago

Siemens Patch Tuesday updates for April 2019 address several serious vulnerabilities, including some DoS flaws in many industrial products. Siemens…

APT28 and Upcoming Elections: evidence of possible interference

7 years ago

In mid-March, a suspicious Office document referencing the Ukraine elections appeared in the wild, is it related to APT28 and…

Emsisoft released a free decryptor for CryptoPokemon ransomware

7 years ago

Good news for the victims of the CryptoPokemon ransomware, security experts at Emsisoft just released a free decrypter tool. Victims…

VPN apps insecurely store session cookies in memory and log files

7 years ago

At least four VPN apps sold or made available to enterprise customers share security flaws, warns the Carnegie Mellon University…

Zero-day in popular Yuzo Related Posts WordPress Plugin exploited in the wild

7 years ago

According to experts a vulnerability in the popular WordPress plugin Yuzo Related Posts is exploited by attackers to redirect users…

VSDC video editing software website hacked again

7 years ago

Users that have downloaded the VSDC multimedia editing software between 2019-02-21 and 2019-03-23, may have been infected with malware. Users…

FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT

7 years ago

According to a joint report published by the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation…

WikiLeaks Founder Julian Assange arrested and charged in US with computer hacking conspiracy

7 years ago

WikiLeaks founder Julian Assange has been arrested at the Ecuadorian Embassy in London. after Ecuador withdrew asylum after seven years.…

WPA3 attacks allow hackers to hack Wi-Fi password

7 years ago

Security researchers discovered weaknesses in WPA3 that could be exploited to recover WiFi passwords by abusing timing or cache-based side-channel…

This website uses cookies.