Using WiFi connection probe requests to track users

4 years ago

Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. A group of academics…

Security Affairs newsletter Round 369 by Pierluigi Paganini

4 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for…

Ransomware gangs are exploiting CVE-2022-26134 RCE in Atlassian Confluence servers

4 years ago

Ransomware gangs are actively exploiting CVE-2022-26134 remote code execution (RCE) flaw in Atlassian Confluence Server and Data Center. Multiple ransomware…

HID Mercury Access Controller flaws could allow to unlock Doors

4 years ago

Experts found vulnerabilities in HID Mercury Access Controllers can be exploited by attackers to remotely unlock doors. Researchers from security…

Iran-linked Lyceum APT adds a new .NET DNS Backdoor to its arsenal

4 years ago

Iran-linked Lyceum APT group uses a new .NET-based DNS backdoor to target organizations in the energy and telecommunication sectors. The…

PACMAN, a new attack technique against Apple M1 CPUs

4 years ago

PACMAN is a new attack technique demonstrated against Apple M1 processor chipsets that could be used to hack macOS systems.…

Threat actors exploit recently disclosed Atlassian Confluence flaw in cryptomining campaign

4 years ago

Threat actors are exploiting the recently disclosed CVE-2022-26134 RCE in Atlassian Confluence servers to deploy cryptocurrency miners. CheckPoint researchers have…

Experts spotted a new variant of the Cuba Ransomware with optimized infection techniques

4 years ago

The Cuba ransomware operators are back and employed a new version of its malware in recent attacks. Cuba ransomware has…

Vice Society ransomware gang adds the Italian City of Palermo to its data leak site

4 years ago

The Vice Society group has claimed responsibility for the ransomware attack that hit the Italian city of Palermo forcing the…

Symbiote, a nearly-impossible-to-detect Linux malware

4 years ago

Researchers uncovered a high stealth Linux malware, dubbed Symbiote, that could be used to backdoor infected systems. Joint research conducted by…

This website uses cookies.