Hacking

Cyber Defense Magazine – September 2018 has arrived. Enjoy it!

We hope you enjoy this month's edition...packed with 100+ pages of excellent content.  InfoSec Knowledge is Power.  We have 6…

7 years ago

September 2018 Security Notes address a total of 14 flaws in SAP products

SAP today just released the September 2018 set of Security Notes that address a total of 14 flaws in its…

7 years ago

Researchers show how to clone Tesla S Key Fobs in a few seconds

Researchers demonstrated that it is possible to rapidly clone the wireless key fob of the expensive Tesla Model S and possibly…

7 years ago

Zerodium disclose exploit for NoScript bug in version 7 of Tor Browser

Zero-day broker Zerodium has disclosed a NoScript vulnerability that could be exploited by attackers to execute arbitrary JavaScript code in the Tor Browser.…

7 years ago

Chinese LuckyMouse APT has been using a digitally signed network filtering driver in recent attacks

Security experts observed the LuckyMouse APT group using a digitally signed 32- and 64-bit network filtering driver NDISProxy in recent…

7 years ago

GAO Report shed the lights on the failures behind the Equifax hack

A new report from the U.S. Government Accountability Office (GAO) provides detailed information of the Equifax hack. The Equifax hack…

7 years ago

Mirai and Gafgyt target Apache Struts and SonicWall to hit enterprises

Security experts with Unit 42 at Palo Alto Networks have discovered new variants of the Mirai and Gafgyt IoT malware…

7 years ago

A growing number of iOS apps collect and sell location data

A growing number of iOS apps currently collect location data, WiFi network IDs and other data, from iPhone users and sell…

7 years ago

Fallout exploit kit appeared in the threat landscape in malvertising campaigns

At the end of August, security experts discovered a new exploit kit called Fallout that is being used to distribute…

7 years ago

The main source of infection on ICS systems was the internet in H1 2018

Researchers from Kaspersky have published a new report on the attacks on ICS systems observed by its products in the…

7 years ago

This website uses cookies.