Cisco data leak – Job applications portal leaked personal information

9 years ago

Cisco data leak - Cisco has fixed a security vulnerability in the company Professional Careers portal that exposed personal information…

Bypassing Two-Factor Authentication on Outlook Web Access

9 years ago

Enterprises running Exchange Server using two-factor authentication on Outlook Web Access (OWA) could be hacked due to a design flaw.…

Databases of Indian embassies leaked online. Too easy hack them

9 years ago

The databases of the Indian Embassies in Switzerland, Mali, Romania, Italy, Malawi, and Libya were leaked online by two grey…

How to Exploit Belkin WEMO gear to hack Android devices

9 years ago

Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL…

Watch out! A new LinkedIn Phishing campaign is spreading in the wild

9 years ago

Experts from Heimdal Security reported a recent LinkedIn phishing campaign aiming to collect confidential information from unsuspecting users. Phishing attacks…

Security Affairs newsletter Round 85 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

Commercial Exaspy spyware used to target high-level executives

9 years ago

Security researchers at Skycure have discovered a new commodity Android Spyware, dubbed Exaspy, targeting high-level executives. While in many countries…

The US Government is ready to hack back if Russia tries to hit Presidential Election

9 years ago

Documents and testimonials collected by the NBC news confirm US Government cyber army is ready to hack back if Russia…

One oAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed

9 years ago

Security researchers demonstrated that a Wrong oAuth 2.0 implementation allows a remote simple hack that exposes more than 1 Billion…

How to compromise PLC systems via stealthy Pin control attacks

9 years ago

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems…

This website uses cookies.