Hacking

Security breach at North Country PoS firm hits hundreds of US restaurants and Hotels

North Country Business Products POS (point-of-sale) and security solutions provider announced a data breach that affected hundreds of U.S. restaurants and hotels.…

7 years ago

Experts found a Remote Code Execution flaw in WordPress 5.0.0

Security experts disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6…

7 years ago

The Muncy malware is on the rise

Over the last few days, a phishing campaign from DHL and entitled “DHL Shipment Notification” has been targeted users worldwide…

7 years ago

These Are the Countries With the Best and Worst Cybersecurity

Cybersecurity is a growing concern among governments, businesses and individuals around the world. Cyberattacks can have severe impacts on everyone.…

7 years ago

Offensive Security announced the release of Kali Linux 2019.1

It's official, Offensive Security announced the release of Kali Linux 2019.1, the latest version of the popular penetration testing and…

7 years ago

Group-IB: More than 70% of Russian banks are not ready for cyberattacks

According to a new research conducted by Group-IB experts, 74 percent of Russian banks were not ready for cyberattacks Group-IB,…

7 years ago

Gnosticplayers round 3 – 92 Million fresh accounts from 8 unreported security breaches available for sale

Gnosticplayers hacker is offering in a third round a new set of databases containing millions of hacked accounts from unreported…

7 years ago

Expert found privilege escalation issue in LG Device Manager

Security expert discovered a privilege escalation flaw that could be exploited by attackers to elevate permissions to SYSTEM in the…

7 years ago

New Trickbot module implements Remote App Credential-Grabbing features

The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new module used for…

7 years ago

Free Tool: Honey Feed

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi…

7 years ago

This website uses cookies.