Advantech addressed code execution and DoS flaws in WebAccess software

7 years ago

Industrial automation firm Advantech addressed several serious vulnerabilities in its WebAccess SCADA software. WebAccess is a browser-based software package for…

Experts found 540 Million Facebook user records on unprotected Amazon S3 buckets

7 years ago

The huge trove of Facebook user data was amassed and stored online on unprotected cloud servers by third-party Facebook app…

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

7 years ago

The OceanLotus APT group, also known as APT32 or Cobalt Kitty, leverages a steganography-based loader to deliver backdoors on compromised…

Group-IB report: JS-sniffers infected 2440 websites around the world

7 years ago

Crime without punishment: Group-IB issues a new report on JS-sniffers that infected 2440 websites around the world Group-IB, an international…

Georgia Tech security breach exposed up to 1.3 million individuals

7 years ago

The Georgia Institute of Technology (Georgia Tech) announced to have suffered a security breach, “an unknown outside entity” had access…

Crooks use hidden directories of compromised HTTPS sites to deliver malware

7 years ago

Security experts at Zscaler discovered that threat actors are using hidden “well-known” directories of HTTPS sites to store and deliver…

Cyber Defense Magazine – April 2019 has arrived. Enjoy it!

7 years ago

Cyber Defense eMagazine April 2019 Edition has arrived. We hope you enjoy this month's edition…packed with over 140 pages of…

CVE-2019-0211 Apache flaw allows getting root access via script

7 years ago

The privilege escalation vulnerability (CVE-2019-0211) affecting the Apache HTTP server could be exploited by users with the right to write…

26k+ Kibana Instances exposed Elasticsearch databases online

7 years ago

Security expert discovered thousands of unsafe Kibana instances that are exposed online, the news was first reported by colleagues at…

Analyzing AZORult malware using NSA Ghidra suite

7 years ago

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the…

This website uses cookies.