GovRAT 2.0 continues to target US companies and Government

9 years ago

Vxers developed a new version of GovRAT, called GovRAT, that has been used to target government and many other organizations…

CVE-2016-6662 – Researcher disclosed a critical MySQL Zero-Day

9 years ago

A security researcher disclosed a critical MySQL zero-day affecting all the default configuration of all MySQL versions including 5.5, 5.6…

Motherboard shows us how surveillance software works

9 years ago

Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software.…

PCI PIN Transaction Security requests upgradeable credit card readers

9 years ago

The Payment Card Industry Security Standards Council (PCI Council) updates its standard to reduce fraudulent activities against PoS systems. The…

Hacking wannabe hackers: watch out Facebook Hacker Tools!

9 years ago

Everyone is a potential victim, even the wannabe hackers that try to exploit Facebook Hacker Tools to hack into friends'…

Mal/Miner-C mining malware leverages NAS devices to spread itself

9 years ago

Experts from Sophos discovered Mal/Miner-C, a malware designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency.…

Hacker Interviews – Anonandmore

9 years ago

Every collective has its tactics and tools, Today I’ll present you Anonandmore, a hacker that is very active online. Enjoy the…

LuaBot is the first Linux DDoS botnet written in Lua Language

9 years ago

The researcher MalwareMustDie discovered LuaBot, a trojan completely coded in Lua language that is targeting Linux platforms to recruit them…

Security Affairs newsletter Round 77 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

CVE-2016-6399 – CISCO disclosed unpatched flaw in ACE products

9 years ago

Cisco disclosed the existence of the CVE-2016-6399 flaw that can be exploited by remote unauthenticated attackers to trigger DoS conditions…

This website uses cookies.