You searched for: Pierluigi Paganini

US-CERT warns of ongoing cyber attacks aimed at ERP applications

US-CERT warns of cyber attacks on ERP applications, including Oracle and SAP, and refers an interesting report published by Digital Shadows…

7 years ago

ProtonMail launches Address Verification and full PGP support

Address Verification allows you to be sure you are securely communicating with the right person, while PGP support adds encrypted…

7 years ago

Ransomware attack disrupted some systems of the shipping giant COSCO in the US

The Chinese shipping giant COSCO was reportedly hit by a ransomware based attack, the attack occurred in the American region. According…

7 years ago

Experts discovered a Kernel Level Privilege Escalation in Oracle Solaris

Security expert discovered Kernel Level Privilege Escalation vulnerability in the Availability Suite Service component of Oracle Solaris 10 and 11.3 Security…

7 years ago

Kronos Banking Trojan resurrection, new campaigns spotted in the wild

Researchers from Proofpoint have discovered a new variant of the infamous Kronos banking Trojan that was involved in several attacks in the…

7 years ago

Hide ‘N Seek botnet also includes exploits for home automation systems

Security experts from Fortinet have discovered that the Hide ‘N Seek botnet is now targeting vulnerabilities in home automation systems. The Hide ‘N Seek…

7 years ago

Korean Davolink routers are easy exploitable due to poor cyber hygene

Davolink dvw 3200 routers have their login portal up on port 88, the access is password protected, but the password…

7 years ago

The Death botnet grows targeting AVTech devices with a 2-years old exploit

A new botnet, tracked as Death botnet has appeared in the threat landscape and is gathering unpatched AVTech devices with…

7 years ago

Apache Software Foundation fixes important flaws in Apache Tomcat

The Apache Software Foundation has rolled out security updates for the Tomcat application server that address several flaws. The Apache…

7 years ago

CVE-2018-5383 Bluetooth flaw allows attackers to monitor and manipulate traffic

Security researchers have found a high severity flaw (CVE-2018-5383) affecting some Bluetooth implementations that allow attackers to manipulate traffic. Security researchers at the…

7 years ago

This website uses cookies.