CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems

6 years ago

Researchers discovered a vulnerability tracked as CVE-2019-14899 that can be exploited to hijack active TCP connections in a VPN tunnel…

OpenBSD addresses authentication bypass, privilege escalation issues

6 years ago

Experts from Qualys Research Labs discovered four high-severity security flaws in OpenBSD, one of which is a type authentication bypass…

China used the Great Cannon DDoS Tool against forum used by Hong Kong protestors

6 years ago

China is accused to have used the "Great Cannon" DDoS tool to launch attacks against LIHKG, a forum used by Hong…

CyrusOne, one of the major US data center provider, hit by ransomware attack

6 years ago

Ransomware attacks continue to threaten organizations worldwide, CyrusOne, one of the biggest data center providers in the US, is facing…

The evolutions of APT28 attacks

6 years ago

Analyzing how tactics, techniques and procedures of the Russia-linked APT28 cyberespionage group evolve over the time. APT28 is a well known…

Iran-Linked APT groups target energy, industrial sectors with ZeroCleare Wiper

6 years ago

Experts spotted a piece of malware dubbed ZeroCleare that has been used in highly targeted attacks aimed at energy and…

Two malicious Python libraries were stealing SSH and GPG keys

6 years ago

The Python security team removed two trojanized Python libraries from PyPI (Python Package Index) that were stealing SSH and GPG…

Mozilla removed 4 Avast and AVG extensions for spying on Firefox users

6 years ago

Mozilla has removed four extensions from Avast and AVG from the Firefox site that are suspected to track user activity…

Talos experts found a critical RCE in GoAhead Web Server

6 years ago

Experts at Cisco Talos found two vulnerabilities in the GoAhead embedded web server, including a critical remote code execution flaw.…

A flaw in Microsoft OAuth authentication could lead Azure account takeover

6 years ago

A vulnerability in the Microsoft OAuth implementation exposes Azure cloud accounts to takeover. The vulnerability affects the way Microsoft applications…

This website uses cookies.