Hacking

Experts published a PoC code for Intel Management Engine JTAG flaw

A group of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. A…

7 years ago

Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted

The Cryptocurrency Platform Atlas Quantum suffered a security breach, information belonging to more than 260,000 users was stolen by hackers. Hackers…

7 years ago

Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild

According to the threat intelligence firm Volexity, the CVE-2018-11776 vulnerability is already being abused in malicious attacks in the wild. Just…

7 years ago

Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day

A security researcher has publicly disclosed the details of zero-day privilege escalation vulnerability affecting all Microsoft's Windows operating systems A security…

7 years ago

Iran-linked COBALT DICKENS group targets universities in new phishing campaign

Experts from SecureWorks discovered a large phishing campaign targeting universities carried out by an Iran-linked threat actor COBALT DICKENS. Security…

7 years ago

Security firm attributes Cosmos Bank cyberheist to Lazarus APT

Security experts from Securonix have published a report that attributes the attack against on the Cosmos Bank to the Lazarus APT…

7 years ago

Experts warn of possible attacks after PoC code for CVE-2018-11776 Struts flaw was published

The Exploit code for the recently discovered Critical remote code execution vulnerability CVE-2018-11776 in Apache Struts 2 was published on GitHub, experts…

7 years ago

Android mobile devices from 11 vendors are exposed to AT Commands attacks

A group of researchers has conducted an interesting study on AT commands attacks on modern Android devices discovering that models…

7 years ago

Google researcher found Fortnite Android App vulnerable to Man-in-the-Disk attacks

A Google security researcher disclosed a vulnerability in the newcome Fortnite Android App that exposes it to Man-in-the-Disk attacks. After…

7 years ago

USBHarpoon a look-like charging cable that can hack into your computer

A team of security experts has devised a rogue USB charging cable named USBHarpoon that can be used to compromise a…

7 years ago

This website uses cookies.