Malicious package containing Bytecoin cryptocurrency miner found on the Ubuntu Snap Store

8 years ago

An Ubuntu user has spotted a Bytecoin cryptocurrency miner hidden in the source code of an Ubuntu Snap Pack in…

UK mobile operator EE left a critical code system exposed with a default password

8 years ago

The EE operator, the British largest cell network in the UK with some 30 million customers, has left a critical…

iVideon Russian-based video surveillance solution leaked data, hundreds of thousands of records exposed

8 years ago

Security researchers from Kromtech Security discovered a MongoDB install belonging to the Russian-based video surveillance firm Did iVideon open online. The database included personal information…

Wannacry outbreak anniversary: the EternalBlue exploit even more popular now

8 years ago

WannaCry ransomware outbreak anniversary - According to researchers from ESET, the popularity of EternalBlue increase significantly over the past months.…

Google addresses critical security vulnerabilities in Chrome 66

8 years ago

Google released an updated version of Chrome 66 that addresses a Critical security vulnerability that could be exploited by an…

Throwhammer, the new Rowhammer attack to remotely hack systems over the LAN

8 years ago

  Security experts devised a new attack technique dubbed Throwhammer that could be exploited by attackers to launch Rowhammer attack on…

Mining passwords from dozens of public Trello boards

8 years ago

Trello, when an error in the publishing strategy is able to put at risk the private data of a huge…

Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFU

8 years ago

On May 4th Tech giant Telstra discovered a vulnerability in its service that could potentially expose customers of its cloud…

Allanite threat actor focused on critical infrastructure is targeting electric utilities and ICS networks

8 years ago

Security experts from the industrial cybersecurity firm Dragos warn of a threat actor tracked as Allanite has been targeting business and industrial…

The source code of the TreasureHunter PoS Malware leaked online

8 years ago

  Security experts at Flashpoint confirmed the availability online for the source code of the TreasureHunter PoS malware since March. The researchers found…

This website uses cookies.