US DoJ charges Huawei sanctions violations and in technology espionage

7 years ago

The US Justice Department charges the Chinese telecommunications giant Huawei in technology theft and violation of sanctions. The US Justice…

Disable FaceTime, a bug lets you hear a person’s audio before he answers

7 years ago

A major vulnerability in the Apple FaceTime lets you hear the audio of the person you are calling … before…

Authorities shut down XDEDIC marketplace in an international operation

7 years ago

A  joint operation conducted by law enforcement agencies in the United States and Europe allowed seizing the xDedic marketplace. Law…

Aztarna – the open-source scanning tool for vulnerable robots

7 years ago

Experts from Alias Robotics released a free, open-source tool dubbed Aztarna that could be used to find vulnerable robots. A…

Hackers compromise WordPress sites via Zero-Day flaws in Total Donations plugin

7 years ago

Security experts at Wordfence security firms discovered WordPress Sites compromised via Zero-Day vulnerabilities in Total Donations Plugin The Total Donations…

Dailymotion forces password reset in response to credential stuffing Attack

7 years ago

The popular video sharing website Dailymotion announced that some accounts were accessed by hackers as result of a massive credential…

Hackers are targeting Cisco RV320/RV325, over 9K routers exposed online

7 years ago

Cisco released security updates to address security flaws in several products including Small Business RV320/RV325 routers and hackers are already…

Cobalt cybercrime gang abused Google App Engine in recent attacks

7 years ago

The Cobalt cybercrime gang has been using Google App Engine to distribute malware through PDF decoy documents. The Cobalt hacking…

Security Affairs newsletter Round 198 – News of the week

7 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

Using steganography to obfuscate PDF exploits

7 years ago

Experts discovered PDF exploit that was using steganography to hide malicious JavaScript code in images embedded in PDF files. The…

This website uses cookies.