Using the Microsoft EMET security tool to hack itself

10 years ago

The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation…

Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

10 years ago

Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know…

The new FighterPOS PoS Malware implements worm capabilities

10 years ago

The threat actors behind the FighterPOS PoS malware have added worm capabilities to their malicious code that is now targeting…

A journalist has been hacked on a plane while writing an Apple-FBI story

10 years ago

The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the…

A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

10 years ago

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still…

Security Affairs newsletter Round 49 – News of the week

10 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Project Cumulus…

German authorities approve the use of home-made Federal Trojan

10 years ago

The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The…

CTB-Locker for Websites is spreading in the wild

10 years ago

The experts at BleepingComputer reported a new strain of CTB-Locker for Websites, a new ransomware that mainly targets WordPress sites.…

Securing Hospitals from hackers that can put lives in dangers

10 years ago

Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of…

Gemalto Breach Level Index report 2015, what are hackers looking for?

10 years ago

2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per…

This website uses cookies.