Moodle flaw exposed users to account takeover

5 years ago

Wizcase experts discovered a security flaw in the open-source learning platform Moodle that could allow accounts takeover. At the beginning…

Swarmshop – What goes around comes around: hackers leak other hackers’ data online

5 years ago

Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked…

Pwn2Own 2021 Day 2 – experts earned $200K for a zero-interaction Zoom exploit

5 years ago

Pwn2Own 2021 - Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One…

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof

5 years ago

Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million…

Cisco fixed multiple flaws in SD-WAN vManage Software, including a critical RCE

5 years ago

Cisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple…

User database was also hacked in the recent hack of PHP ‘s Git Server

5 years ago

The maintainers of the PHP programming language confirmed that threat actors may have compromised a user database containing their passwords.…

Man arrested after hired a hitman on the dark web

5 years ago

A joint operation of Europol and the Italian Postal and Communication Police resulted in the arrest of an Italian national…

New Cring ransomware deployed targeting unpatched Fortinet VPN devices

5 years ago

Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the industrial sector.…

Pwn2Own 2021 Day 1 – participants earned more than $500k

5 years ago

The Pwn2Own 2021 hacking competition has begun and white hat hackers participants earned more than $500000 on the first day.…

Crooks use Telegram bots and Google Forms to automate phishing

5 years ago

Crooks increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites.…

This website uses cookies.