Hacking

Local privilege escalation bug fixed in CheckPoint ZoneAlarm

Check Point released a security update to address a flaw in its ZoneAlarm security software that could allow privilege escalation.…

7 years ago

“Collection #1” Data Breach Analysis – Part 2

The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some…

7 years ago

Microsoft Exchange zero-day and exploit could allow anyone to be an admin

The security expert Dirk-jan Mollema with Fox-IT discovered a privilege escalation vulnerability in Microsoft Exchange that could be exploited by…

7 years ago

Kaspersky links GreyEnergy and Zebrocy activities

Security experts from Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) linked the GreyEnergy malware with and…

7 years ago

New Russian Language Malspam is delivering Redaman Banking Malware

A still ongoing spam campaign that has been active during the last months has been distributing the Redaman banking malware.…

7 years ago

Cisco addresses flaws in its products, including Small Business routers and Webex

Cisco released security updates for several products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small…

7 years ago

DHS issues emergency Directive to prevent DNS hijacking attacks

DHS has issued a notice of a CISA emergency directive urging federal agencies of improving the security of government-managed domains…

7 years ago

Expert shares PoC exploit code for remote iOS 12 jailbreak On iPhone X

Researcher published a PoC exploit code for critical vulnerabilities that could be chained to implement an iOS jailbreak On iPhone…

7 years ago

PHP PEAR official site hacked, tainted package manager distributed for 6 months

PHP PEAR official site hacked, attackers replaced legitimate version of the package manager with a tainted version in the past…

7 years ago

A flaw in MySQL could allow rogue servers to steal files from clients

A rogue MySQL server could be used to steal files from clients due to a design flaw in the popular…

7 years ago

This website uses cookies.