Swiss real estate agency Neho fails to put a password on its systems

2 years ago

A misconfiguration of Swiss real estate agency Neho’s systems exposed sensitive credentials to the public. Neho, a Switzerland-based real estate…

Microsoft found a new bug that allows bypassing SIP root restrictions in macOS

2 years ago

Apple fixed a vulnerability discovered by Microsoft researchers that lets attackers with root privileges bypass System Integrity Protection (SIP). Researchers…

PyPI enforces 2FA authentication to prevent maintainers’ account takeover

2 years ago

PyPI is going to enforce two-factor authentication (2FA) for all project maintainers by the end of this year over security…

A database containing 478,000 RaidForums members leaked online

2 years ago

The database of the popular RaidForums hacking forum has been leaked on a new hacking forum, 478,000 members exposed. A…

Beware of the new phishing technique “file archiver in the browser” that exploits zip domains

2 years ago

"file archiver in the browser" is a new phishing technique that can be exploited by phishers when victims visit a…

BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint

2 years ago

Researchers devised an attack technique, dubbed BrutePrint Attack, that allows brute-forcing fingerprints on smartphones to bypass authentication. Researchers have devised…

Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals

2 years ago

Managed Care of North America (MCNA) Dental disclosed a data breach that impacted more than 8.9 million individuals. Managed Care…

New Go-written GobRAT RAT targets Linux Routers in Japan

2 years ago

A new Golang remote access trojan (RAT), tracked as GobRAT, is targeting Linux routers in Japan, the JPCERT Coordination Center warns.…

Researchers analyzed the PREDATOR spyware and its loader Alien

2 years ago

Cisco Talos and the Citizen Lab researchers have published a technical analysis of the powerful Android spyware Predator. Security researchers…

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

2 years ago

Experts warn of phishing attacks that are combining the use of compromised Microsoft 365 accounts and .rpmsg encrypted emails. Trustwave…

This website uses cookies.