Security Affairs newsletter Round 84 – News of the week

10 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

LDAP as attack vector could power Terabit-Scale LDAP DDoS Attacks

10 years ago

Security experts observed attackers launching a powerful LDAP DDoS, the new amplification method could peak Terabit-Scale attacks. LDAP DDoS attacks…

Exclusive: MalwareMustDie spotted a new IoT Linux/IRCTelnet malware made in Italy

10 years ago

Exclusive: The security researcher MalwareMustDie has found a new Linux/IRCTelnet malware- made in Italy - that aims IoT botnet connected…

Red Cross Blood Service incident. The Australian largest ever leak of Personal data

10 years ago

The Australian Red Cross Blood Service confirmed the data leak that exposed a backup database containing the personal details of…

Hacking back the Mirai botnet, technical and legal issues

10 years ago

Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back…

Ukrainian hackers Cyber Hunta leaked emails of Putin’s Advisor

10 years ago

Hackers of the Cyber Hunta collective leaked thousands of emails allegedly stolen from the account of Vladislav Yuryevich Surkov. Last…

Michigan State University hacked, personal information leaked online

10 years ago

The young hacker Mys7erioN announced to have hacked into the database of a US organization, the Michigan State University. Data…

AtomBombing Code Injection can potentially hack all Windows OS versions

10 years ago

Researchers from ENSILO have devised a method, called AtomBombing, to inject malicious code in Windows OS that bypasses modern anti-malware…

Crime doesn’t pay, Fappening hacker gets 18 months in jail

10 years ago

The person behind the Fappening case, Ryan Collins (36), received a lighter penalty than the five years prison initially on…

The Icarus box is able to hijack nearly any drone mid-flight

10 years ago

A security researcher presented a small hardware named Icarus box that is able to hijack a variety of popular drones…

This website uses cookies.