Punkey, a new POS Malware in the criminal ecosystem

9 years ago

During a recent investigation the experts at Trustwave encountered a new strain of POS malware dubbed Punkey which presents interesting…

Security Affairs newsletter Round 5 – Best of the week from best sources

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

APT28 Russian hackers exploited two zero-day flaws in the wild

9 years ago

FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government…

TheRealDeal black Marketplace Offers Zero-Day Exploits

9 years ago

A new deep web marketplace dubbed TheRealDeal has appeared and it is offering a platform for both sellers and buyers…

Safari cookie access vulnerability affects a billion iThings

9 years ago

A Safari iOS/OS X/Windows cookie access vulnerability (CVE-2015-1126) potentially affects a billion iThings devices, patch it as soon as possible.…

Java – New vulnerabilities affects million applications

9 years ago

Oracle warned that a dozen of new Java security vulnerabilities could be exploitable remotely to gain access to a target…

How to move YouTube comments from any video to another

9 years ago

An Egyptian Researcher discovered a flaw that allowed him to duplicate/copy any YouTube comments from any video to another video…

In-flight Wi-Fi can be an open door for hackers

9 years ago

A report published by the Government Accountability Office (GAO) warns that the FAA faces some serious cyber security issues for…

Wikileaks released documents from Sony hack, the company condemned it

9 years ago

WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber…

MS15-034 flaw leaves over 70 million sites vulnerable to cyber attacks

9 years ago

Security experts worldwide have discovered that threat actors are exploiting the Microsoft Zero-Day vulnerability MS15-034 in cyber attacks. Security researchers…

This website uses cookies.