Oracle botches CVE-2018-2628 patch and hackers promptly start scanning for vulnerable WebLogic installs

8 years ago

According to a security expert, Oracle appears to have botched the CVE-2018-2628 fix, this means that attackers could bypass it…

Op GhostSecret – ThaiCERT seized a server used by North Korea Hidden Cobra APT group in the Sony Picture hack

8 years ago

The Thai authorities with the support of the ThaiCERT and security first McAfee have seized a server used by North…

New Bezop Cryptocurrency (BEZ) leaks Personal details for 25k users

8 years ago

Security experts at Kromtech discovered a MongoDB exposed personal details of 25,000 users tied to the Bezop cryptocurrency. Security researchers…

Ops … Why is Facebook interested in my culinary tastes on Faasos portal?

8 years ago

During checkout from faasos, I observed that there are several requests going to Facebook, which carries your Faasos details without user's…

90% of the SAP customers exposed to hack due to 13 Year-Old configuration flaw

8 years ago

Many companies using SAP systems ignore to be impacted by a 13-year-old security configuration that could expose their architecture to…

Security Affairs newsletter Round 160 – News of the week

8 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

Firefox 60 supports Same-Site Cookies to prevent CSRF attacks

8 years ago

This week Mozilla announced that the upcoming Firefox 60 version will implement a new Cross-Site Request Forgery (CSRF) protection by introducing support for…

Researchers discovered the control console of a ski lift in Austria open online

8 years ago

Two security experts discovered that the control panel of a Ski lift in Austria was exposed online without any protection.…

Expert shows how to trigger blue-screen-of-death on Windows by triggering NTFS flaw

8 years ago

Bitdefender researcher Marius Tivadar has developed a dodgy NTFS file system image that could trigger a blue-screen-of-death when a mount is attempted…

How to use weaponized PDF documents to steal Windows credentials

8 years ago

Weaponized documents are the main ingredient for almost any spam and spear-phishing campaign, let's see how to steal windows credentials…

This website uses cookies.