Hacking

Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet traffic…

7 years ago

XSS flaw in Evernote allows attackers to execute commands and steal files

Security expert discovered a stored XSS flaw in the Evernote app for Windows that could be exploited to steal files and…

7 years ago

A flaw in WooCommerce WordPress Plugin could be exploited to take over e-stores

A critical Remote Code Execution vulnerability affects eCommerce website running on WordPress and using the WooCommerce plugin. A critical vulnerability affects…

7 years ago

Researcher discloses VirtualBox Zero-Day without reporting it to Oracle

Security expert disclosed the details of a zero-day flaw affecting Oracle’s VirtualBox virtualization software without waiting for a patch from…

7 years ago

HSBC Bank USA notified customers of a security breach

HSBC Bank USA notified customers of a data breach that has happened between Oct 4 and Oct 14, unknown attackers were able…

7 years ago

Apache Struts users have to update FileUpload library to fix years-old flaws

Apache Struts Users have to update the Commons FileUpload library in Struts 2 that is affected by two vulnerabilities. Apache Struts developers have…

7 years ago

Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges

Group-IB and Swiss insurance broker ASPIS that owns CryptoIns project, have developed the world’s first scoring model for assessing cryptocurrency exchanges Group-IB, an international…

7 years ago

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a…

7 years ago

Shellbot Botnet Targets IoT devices and Linux servers

Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot. The malware was distributed…

7 years ago

Google dorks were the root cause of a catastrophic compromise of CIA’s communications

Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens…

7 years ago

This website uses cookies.