CVE-2017-5638 Apache Struts vulnerability is the root cause behind Equifax data breach

9 years ago

It's official, the Equifax data breach case was caused by the exploitation of the CVE-2017-5638 Apache Struts vulnerability. The Equifax…

Premium SMS malware EXPENSIVEWALL infected millions of Android handsets

9 years ago

Google removed 50 malicious apps from the official Play Store after experts discovered a new malware, dubbed ExpensiveWall, eluded Google Bouncer…

Backdoored Display Widgets Plugin potentially affects 200,000 WordPress installs abusing them to spam content

9 years ago

Around 200,000 WordPress websites using the Display Widgets Plugin were impacted after it was updated to include malicious code. According…

Thousands of Elasticsearch installs compromised to host PoS Malware

9 years ago

Experts discovered 4,000 compromised installations on Amazon AWS of open source analytics and search tool Elasticsearch that were running PoS malware. Security…

Zerodium is offers $1 Million for Tor Browser Exploits

9 years ago

The company ZERODIUM announced it will pay up to $1 million for fully working zero day exploits for Tor Browser…

Kaspersky Lab solutions banned from US government agencies

9 years ago

The US Department of Homeland security banned government agencies for using software products developed by Kaspersky Lab Bad news for…

September Patch Tuesday, patch your Windows now to avoid ugly surprises

9 years ago

Microsoft has just released the September Patch Tuesday, a huge batch of security updates to address 81 vulnerabilities including Blueborne issue.…

Bashware attack, how to run Linux malware on Windows systems

9 years ago

Experts found a new alarming method dubbed Bashware attack that allows attackers to silently run malware to bypass even the…

Adobe patches only two critical vulnerabilities in Flash Player in September

9 years ago

This month, Adobe has patched only two vulnerabilities in Flash Player, both are critical issues that could be exploited for…

Billions of mobile, desktop and IoT devices potentially exposed to BlueBorne Attack

9 years ago

Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new stealthy remote attack dubbed…

This website uses cookies.