Hacking

Cisco fixes DoS, Authentication Bypass issues with its products and OSPF flaw

Cisco addressed 15 flaws in its products, including 2 flaws that could be exploited by attackers to trigger a DoS…

9 years ago

UK malware researcher Marcus Hutchins accused of creating Kronos Trojan

The British security researcher Marcus Hutchins was arrested by the FBI on Thursday after being indicted on charges of creating…

9 years ago

WannaCry Hero Marcus Hutchins was detained in Las Vegas after Def Con conference

Marcus Hutchins, the expert who discovered the "kill switch" that halted the outbreak of the WannaCry ransomware was detained in Las…

9 years ago

New TrickBot banking Trojan variant borrows spreading capabilities from Wannacry

A cyber gang is improving its version of the TrickBot banking Trojan by implementing the self-spreading worm-like capabilities used by…

9 years ago

The bateleur backdoor is the new weapon in the Carbank gang’s arsenal

Experts at Proofpoint noticed the infamous cyber crime gang Carbanak has added a new JScript backdoor dubbed Bateleur Backdoor to its…

9 years ago

The Svpeng Trojan continues to evolve, the last variant includes keylogger capabilities

Security experts at Kaspersky discovered the dreaded Svpeng Trojan has been recently modified to implement keylogger features. Cyber criminals are…

9 years ago

ICS-CERT Issues Warning of CAN Bus Vulnerability

The US ICS-CERT issued an alert in response to a public report of a vulnerability in the Controller Area Network…

9 years ago

Roughly 175,000 Chinese Internet Connected security cameras can be easily hacked

An estimated 175,000 Internet of Things (IoT) connected security cameras manufactured by Shenzhen Neo Electronics are vulnerable to cyber attacks.…

9 years ago

Security flaws affect TCUs used in BMW, Ford, Infiniti, and Nissan vehicles

Three security researchers have discovered security vulnerabilities in the telematics control units (TCUs) used in BMW, Ford, Infiniti, and Nissan…

9 years ago

TOPransom: From eMail Attachment to Powning the Attacker’s Database

TOPransom - Analyzing the entire process from getting an email attachment to powning the ransom server trying to stop the…

9 years ago

This website uses cookies.