A security expert has discovered a severe vulnerability in BitTorrent Sync that can be exploited by a remote attacker to execute arbitrary code on a vulnerable machine. The security expert Andrea Micalizzi, also known as “rgod,”, has discovered a serious vulnerability in BitTorrent Sync (CVE-2015-2846) can be exploited by a remote attacker to execute arbitrary code. […]
The organization Linux Australia revealed that one of its servers was hacked. The personal data of conference attendees might have been exposed. Linux Australia revealed a data breach occurred on March 22, according to the organization attackers may have accessed personal details of conference attendees. Linux Australia is an organization that represents nearly 5,000 Australian users […]
A new phishing scam is targeting Yahoo users worldwide, this campaign could be ineffective if we share awareness about bad actors’ TTPs. A new large-scale scam is trying to deceive Yahoo users that are receiving a phishing email that asks for “Yahoo Account Confirmation.” The phishing email claims to be sent by Yahoo, it requests […]
A severe vulnerability  in Tor network was exploited by attackers to run denial of service attacks against two underground black markets. An operator of an underground black market hosted on the Tor network revealed that hit site suffered a DoS attack that exploited a flaw in Tor architecture. The event is not isolated, a similar […]
A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets, even overseas hackers The President of United States, Barack Obama has signed an executive order that uses economic restrictions to “control” anyone that is trying to attack any American interests. But what this exactly means? […]
A security researcher discovered that the improper configuration of some multicast DNS (mDNS) implementations could be used to amplify DDoS attacks. The multicast Domain Name System, also known as mDNS,  is a multiplatform service designed to resolve host names to IP addresses within small networks that doesn’t have a local name server. The mDNS can work in a […]
Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability. Once again, home routers are exposed to the risk of cyber attacks. This time the news is related to the Australian consumer broadband modems that resulted affected by the Poodle and Freak vulnerabilities. Many Australian households […]
A Russian researcher has discovered a critical vulnerability in YouTube that could have been exploited by a hacker to delete any video from the website. The Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube that could be exploited by attackers to delete any video the popular video sharing service. The bug hunter is […]
A security researcher discovered a couple of security issues on GitHub platform explaining how it is possible to exploit them in real attack scenarios. The researcher David Sopas (@dsopas) from Websegura discovered a couple of security issues in the coding website GitHub that were ranked by the company as minor, but that could expose users to cyber attacks. […]
Symantec has discovered a cyber espionage campaign targeting energy companies around the world by infecting them with a new malware dubbed Laziok trojan. Security experts at Symantec have uncovered a new cyber espionage campaign that targeted the energy industry. The threat actors behind the campaign used uses a custom-developed malware dubbed Laziok trojan to exfiltrate sensitive data from […]