Snap packaging could reveal private data in Ubuntu 16.04 version

10 years ago

A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to…

Bangladesh Bank hacked due to inadequate defense systems

10 years ago

Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches…

Facebook passes the 1 million Tor users Milestone

10 years ago

Facebook announced that the number of its users accessing through the Tor network has passed 1 million. The number is…

Software Reverse Engineering Process: Basics and Some Explanations

10 years ago

Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering…

Microsoft Windows Applocker circumvented by exploiting native OS utility to remote execute code

10 years ago

The native Windows command-line utility Regsvr32 can be exploited to bypass MS Applocker and run remote code bypassing protection mechanisms.…

MongoDB DB containing 93.4 million Mexican voter records open online

10 years ago

The security expert  Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records.…

Facebook hacked, someone deployed a malicious webshell on its server

10 years ago

Facebook hacked!  The security expert Orange Tsai discovered the presence of a malicious webshell on one of the company servers.…

FBI paid more than $1.3 million to hack into San Bernardino shooter iPhone

10 years ago

FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to…

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

10 years ago

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

Asian Nation-State hackers use fileless RAT for their hacking campaign

10 years ago

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

This website uses cookies.