Ops … the DoublePulsar NSA-Linked implant now works also on Windows Embedded devices

8 years ago

This is a very bad news for security community, the NSA-linked DoublePulsar exploit can now target Windows Embedded devices. The DoublePulsar…

Talos releases ThanatosDecryptor, a free Thanatos Ransomware decryptor

8 years ago

Experts from Cisco’s Talos team released a free decryption tool for the Thanatos ransomware to recover the files without paying the ransom.…

Unpatched WordPress file deletion vulnerability could allow site takeover and code execution

8 years ago

Seven months ago, security experts discovered a critical file deletion vulnerability that affects all WordPress versions, currently, the issue is…

FastBooking Hotel booking software firm suffered a data breach

8 years ago

A security breach suffered by the Hotel booking software provider FastBooking has affected hundreds of hotels worldwide. The Hotel booking…

Recently discovered RANCOR cyber espionage group behind attacks in South East Asia

8 years ago

Security researchers at Palo Alto Networks have uncovered a new cyber espionage group tracked as RANCOR that has been targeting entities…

Russian police detained cybercriminals who broke into the accounts of 700,000 customers of popular Internet stores

8 years ago

The Ministry of Internal Affairs of the Russian Federation and Group-IB have detained cybercriminals who broke into the accounts of…

The Wi-Fi Alliance announced the launch of the WPA3 security standard

8 years ago

The Wi-Fi Alliance announced late on Monday the launch of the WPA3 security standard that promises to increase the Wi-Fi security.…

Recent spam campaigns powered by Necurs uses Internet Query File attachments

8 years ago

Trend Micro experts reported the Necurs botnet has been using Internet Query (IQY) files in recent spam campaigns to bypass…

One more reason to hate your cellphone battery when it sends private data to the bad actors

8 years ago

Security Researchers demonstrated how a "poisoned" cellphone battery in smartphones can be leveraged to "infer characters typed on a touchscreen We've…

Misconfigured Java web server component Jolokia expose website at cyber attacks

8 years ago

Several websites using the misconfigured Java web server component Jolokia, including those operated by financial organizations. are exposed to cyber…

This website uses cookies.