DUHK Attack allows attackers recover encryption keys used to secure VPN connections and web browsing sessions

8 years ago

DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions…

Bad Rabbit ransomware rapidly spreads, Ukraine and Russia most targeted countries

8 years ago

A new strain of malware dubbed Bad Rabbit ransomware has been found rapidly spreading in Russia, Ukraine and elsewhere. A…

Credentials (UN)Management in home banking.

8 years ago

Introduction Out of the five main information security pillars, namely confidentiality, integrity, availability, authenticity and irrefutability, common users give more…

APNIC Whois-related problem led to accidental exposure of authentication data

8 years ago

APNIC Deputy Director General Sanjaya confirmed that Whois data were accidentally exposed online included authentication details. The Asia-Pacific Network Information…

Researcher spotted flaws in the web-based version of popular Sarahah app

8 years ago

A security researcher discovered a number of embarrassing vulnerabilities in the popular anonymous feedback app Sarahah. The anonymous feedback app…

Whole Foods Market confirms that nearly 100 locations were affected by card breach

8 years ago

According to the Whole Foods Market, crooks may have stolen payment cards at taprooms and full table-service restaurants at nearly…

Latest Russia-linked APT28 campaign targeting security experts

8 years ago

Russian cyber espionage group APT28 targeted individuals with spear-phishing messages using documents referencing a NATO cybersecurity conference. Researchers with Cisco Talos have…

NetBSD security improved with the implementation of kernel ASLR (KASLR)

8 years ago

The development team at NetBSD is going to implement the KASLR (kernel Address Space Layout Randomisation) for 64-bit AMD processors. The…

Exclusive – CSE ZLab experts spotted a new Wonder botnet in the wild

8 years ago

The CSE CybSec Z-Lab Malware Lab spotted a new botnet, dubbed Wonder botnet, while it was investigating malicious code in…

AhMyth Android RAT, another open source Android RAT Tool available on GitHub

8 years ago

The source code of a new Android Remote Administration Tool is available on GitHub, it is dubbed AhMyth Android RAT. You just…

This website uses cookies.