Security Affairs newsletter Round 125 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Hackers…

Tor relay of a Brazilian University was banned after harvesting .onions

9 years ago

The Tor relay of a Brazilian University was banned by the Tor administrators because it was spotted collecting the .onion…

Defray Ransomware used in targeted attacks on Education and Healthcare verticals

9 years ago

Researchers at Proofpoint spotted Defray Ransomware, a new ransomware used in a targeted campaign against education and healthcare organizations. Earlier…

More than 1,700 valid Telnet credentials for IoT devices leaked online

9 years ago

Security researchers are warning of the availability online of a list of IoT devices and associated telnet credentials. The list…

Watch out! Adware spreading via Facebook Messenger

9 years ago

Security experts from Kaspersky Lab have spotted an ongoing cross-platform malware campaign that leverages Facebook Messenger. Security experts from Kaspersky Lab have spotted an…

Cisco IOS vulnerabilities open Rockwell Industrial Switches to attacks

9 years ago

Vulnerabilities in Cisco IOS expose Rockwell Allen-Bradley Stratix and ArmorStratix industrial Ethernet switches to remote attacks. Some models of the…

Mobile Trojan Development Kits allow creating ransomware without the need to write code

9 years ago

Researchers at Symantec have discovered Trojan Development Kits that allow creating Android ransomware without the need to write code. Ransomware…

Zerodium payouts for Messaging, Email App Exploits are $500,000

9 years ago

Zerodium payouts include up to $500,000 for RCE and privilege escalation vulnerabilities affecting popular instant messaging and email applications. The…

WikiLeaks – CIA used ExpressLane to covertly collect data from liaison intel services

9 years ago

WikiLeaks - CIA used ExpressLane to covertly collect data from liaison intel services, including FBI, DHS and the NSA, to…

Ropemaker attack allows to transform email in malicious ones after it’s received

9 years ago

The Ropemaker attack allows hackers to turn an apparently harmless email into a malicious one after it has already been…

This website uses cookies.