Hacking

Source code of Cerberus Android Trojan offered for sale for $100,000

The authors of the Android Cerberus banking trojan are auctioning the project for a price starting at $50,000, with $100K…

6 years ago

NSA/CISA joint report warns on attacks on critical industrial systems

NSA is warning of cyber attacks launched by foreign threat actors against organizations in the critical infrastructure sector across the…

6 years ago

Shadow attacks allow replacing content in signed PDF files

Boffins from the Ruhr University Bochum (Germany) have disclosed a series of new attack methods, dubbed Shadow attacks, against signed…

6 years ago

REMnux 7, a Linux toolkit for malware analysts released

A new version of the REMnux Linux toolkit for malware analysts is available for download, it includes a huge set…

6 years ago

Security Affairs newsletter Round 274

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

6 years ago

Records for 7.5 million users of the digital banking app Dave leaked online

Digital banking app Dave.com discloses a security breach after the known threat actor ShinyHunters leaked 7 million user records on a…

6 years ago

D-Link addressed 5 flaws on some router models, some of them reached EoL

D-Link disclosed five severe vulnerabilities affecting some router models which can be exploited by attackers to compromise a network. D-Link has disclosed five severe vulnerabilities affecting…

6 years ago

US CISA warns of attacks exploiting CVE-2020-5902 flaw in F5 BIG-IP

The U.S. CISA is warning of the active exploitation of the unauthenticated remote code execution CVE-2020-5902 vulnerability affecting F5 Big-IP…

6 years ago

Threat actors are hijacking the infamous Emotet botnet

A sort of vigilante is attempting to disrupt the operations of the Emotet botnet by hacking the supply chain of…

6 years ago

CVE-2020-3452 flaw in Cisco ASA/FTD exploited within hours after the disclosure

Cisco fixed CVE-2020-3452 high-severity path traversal flaw in its firewalls that can be exploited by remote attackers to obtain sensitive…

6 years ago

This website uses cookies.