US-CERT warns of ongoing cyber attacks aimed at ERP applications

8 years ago

US-CERT warns of cyber attacks on ERP applications, including Oracle and SAP, and refers an interesting report published by Digital Shadows…

ProtonMail launches Address Verification and full PGP support

8 years ago

Address Verification allows you to be sure you are securely communicating with the right person, while PGP support adds encrypted…

Ransomware attack disrupted some systems of the shipping giant COSCO in the US

8 years ago

The Chinese shipping giant COSCO was reportedly hit by a ransomware based attack, the attack occurred in the American region. According…

Experts discovered a Kernel Level Privilege Escalation in Oracle Solaris

8 years ago

Security expert discovered Kernel Level Privilege Escalation vulnerability in the Availability Suite Service component of Oracle Solaris 10 and 11.3 Security…

Kronos Banking Trojan resurrection, new campaigns spotted in the wild

8 years ago

Researchers from Proofpoint have discovered a new variant of the infamous Kronos banking Trojan that was involved in several attacks in the…

Hide ‘N Seek botnet also includes exploits for home automation systems

8 years ago

Security experts from Fortinet have discovered that the Hide ‘N Seek botnet is now targeting vulnerabilities in home automation systems. The Hide ‘N Seek…

Korean Davolink routers are easy exploitable due to poor cyber hygene

8 years ago

Davolink dvw 3200 routers have their login portal up on port 88, the access is password protected, but the password…

The Death botnet grows targeting AVTech devices with a 2-years old exploit

8 years ago

A new botnet, tracked as Death botnet has appeared in the threat landscape and is gathering unpatched AVTech devices with…

Apache Software Foundation fixes important flaws in Apache Tomcat

8 years ago

The Apache Software Foundation has rolled out security updates for the Tomcat application server that address several flaws. The Apache…

CVE-2018-5383 Bluetooth flaw allows attackers to monitor and manipulate traffic

8 years ago

Security researchers have found a high severity flaw (CVE-2018-5383) affecting some Bluetooth implementations that allow attackers to manipulate traffic. Security researchers at the…

This website uses cookies.