Hacking

Analyzing the HIGH-TECH CRIME TRENDS 2014 Report

Group-IB published the annual HIGH-TECH CRIME TRENDS 2014 Report, a document focused on high-tech crimes associated with traditional computer crime.…

11 years ago

Same Origin Method Execution attack to perform unintended actions on a website on behalf of victims

A researcher presented a new attack method dubbed Same Origin Method Execution which could be exploited to impersonate the targeted…

11 years ago

South Korea need to overhaul the national ID system

ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years…

11 years ago

Security Companies united against the Hidden Lynx APT and its weapons

Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx…

11 years ago

How to gain control of any Addthis user account

The security expert Federico Fazzi has disclosed a serious vulnerability in the Addthis.com service that allows attackers to take control…

11 years ago

Millions vulnerable UPnP devices vulnerable to attack

Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers…

11 years ago

Millions Android Cyanogenmod users exposed to MitM attacks due to Code re-use

Researcher explains that vulnerable code re-use of zero-day in Android's CyanogenMod exposes million users to Man-In-The-Middle attacks. Security experts always…

11 years ago

ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months.…

11 years ago

SandWorm hacking team exploited 0-day against NATO and other Government entities

iSIGHT Partners firm uncovered a Russian hacking team dubbed Sandworm that was running a cyber espionage campaign on NATO and…

11 years ago

Reflected File Download attack to spread 0-Day Worm Over Any Social Networks

A security expert defined a new attack technique dubbed Reflected File Download that allows to serve a 'Zero-Day' Worm without…

11 years ago

This website uses cookies.