You searched for: Pierluigi Paganini

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner.…

5 years ago

NI CompactRIO controller flaw could allow disrupting production

A serious flaw in National Instruments CompactRIO controllers could allow remote attackers to disrupt production processes in an organization. A…

5 years ago

WordPress Easy WP SMTP zero-day potentially exposes hundreds of thousands of sites to hack

Threat actors are actively exploiting a zero-day vulnerability in the popular Easy WP SMTP WordPress plugin installed on more than…

5 years ago

Spotify reset user passwords after accidentally personal information exposure

Spotify is informing users that their personal information might have been accidentally shared with some of its business partners. Spotify…

5 years ago

Facebook links cyberespionage group APT32 to Vietnamese IT firm

Facebook has suspended some accounts linked to APT32 that were involved in cyber espionage campaigns to spread malware. Facebook has…

5 years ago

Threat actors target K-12 distance learning education, CISA and FBI warn

The US Cybersecurity Infrastructure and Security Agency and the FBI warned about the increase in ransomware attacks targeting the US…

5 years ago

Interview with Massimiliano Brolli, Head of TIM Red Team Research

Interview with Massimiliano Brolli, Head of TIM Red Team Research, which is a team of experts that focus on zero-day…

5 years ago

Adrozek malware silently inject ads into search results in multiple browsers

Microsoft warns of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing…

5 years ago

Cisco addresses critical RCE vulnerability in Jabber

Cisco addressed a new critical RCE vulnerability that affects several versions of Cisco Jabber for Windows, macOS, and mobile platforms. Cisco…

5 years ago

Expert published PoC exploit code for Kerberos Bronze Bit attack

The proof-of-concept exploit code for the Kerberos Bronze Bit attack was published online, it allows intruders to bypass authentication and…

5 years ago

This website uses cookies.