Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

7 years ago

Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet traffic…

U.S. Cyber Command CNMF Shares unclassified malware samples via VirusTotal

7 years ago

The U.S. Cyber Command (USCYBERCOM) CNMF is sharing malware samples with the cybersecurity industry via VirusTotal intelligence service. The U.S. Cyber…

XSS flaw in Evernote allows attackers to execute commands and steal files

7 years ago

Security expert discovered a stored XSS flaw in the Evernote app for Windows that could be exploited to steal files and…

U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program

7 years ago

The United States Air Force announced earlier this week that it has launched the third bug bounty program called Hack the…

A flaw in WooCommerce WordPress Plugin could be exploited to take over e-stores

7 years ago

A critical Remote Code Execution vulnerability affects eCommerce website running on WordPress and using the WooCommerce plugin. A critical vulnerability affects…

Researcher discloses VirtualBox Zero-Day without reporting it to Oracle

7 years ago

Security expert disclosed the details of a zero-day flaw affecting Oracle’s VirtualBox virtualization software without waiting for a patch from…

HSBC Bank USA notified customers of a security breach

7 years ago

HSBC Bank USA notified customers of a data breach that has happened between Oct 4 and Oct 14, unknown attackers were able…

Apache Struts users have to update FileUpload library to fix years-old flaws

7 years ago

Apache Struts Users have to update the Commons FileUpload library in Struts 2 that is affected by two vulnerabilities. Apache Struts developers have…

Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges

7 years ago

Group-IB and Swiss insurance broker ASPIS that owns CryptoIns project, have developed the world’s first scoring model for assessing cryptocurrency exchanges Group-IB, an international…

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

7 years ago

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a…

This website uses cookies.