Wikileaks – CIA developed OutlawCountry Malware to hack Linux systems

9 years ago

WikiLeaks released a new batch of documents that detail the CIA tool OutlawCountry used to remotely spy on computers running Linux operating…

Researcher released Eternal Blues, a free EternalBlue vulnerability scanner

9 years ago

The security researcher Elad Erez developed Eternal Blues, a free EternalBlue vulnerability scanner that could be used to assess networks.…

Cisco IOS Software is affected by RCE flaws that could allow full hack of the devices

9 years ago

Experts at CISCO discovered severe remote code execution vulnerabilities in Cisco IOS Software while conducting internal testing. Cisco warned users of…

NotPetya – Ukraine secret service announces a joint investigation with Europol, FBI, and NCA

9 years ago

Ukraine secret service announces joint investigation with Europol, FBI, and NCA to attribute the recent Notpetya massive attack. While security…

8tracks data leak exposed 18 million user accounts

9 years ago

The Music streaming service 8tracks suffered a major data leak, 18 million user accounts have been exposed and is available…

Microsoft issued Security fix for important flaw in Azure Active Directory Connect

9 years ago

Microsoft is warning sysadmins to check their Azure Active Directory Connect installs and patch them against an important Privilege Escalation…

UK.gov accidental data leak. Users’ details left publicly accessible on a third-party site

9 years ago

UK.gov leaves data dashboard users' details on publicly accessible on a third-party system. Users are urge to reset their password. Are…

Notpetya – The Petya variant used in the massive attack is a wiper disguised by a ransomware

9 years ago

According to the researchers, the Petya variant (NotPetya) used in the massive attack is a wiper disguised by a ransomware.…

Shadow Brokers sent out first round of exploits and threaten to dox former NSA hacker

9 years ago

Shadow Brokers has sent out the first round of exploits to the subscribers of its service, the hackers also threaten…

A critical flaw allows hacking Linux machines with just a malicious DNS Response

9 years ago

A remote attacker can trigger the buffer overflow vulnerability to execute malicious code on affected Linux systems with just a malicious…

This website uses cookies.