Hacking

Experts believe the botmaster of the VPNFilter is attempting to resume the botnet

Experts from security firms GreyNoise Intelligence and JASK believe that the threat actor behind the VPNFilter is now attempting to resume…

8 years ago

Crashing HDDs by launching an attack with sonic and ultrasonic signals

A team of researchers from the University of Michigan and Zhejiang University has devised a method to cause physical damage…

8 years ago

Ticketfly website was compromised, the hacker also stole customers’ data

The website of the events ticketing company Ticketfly was shut down after a hacker who calls himself “IsHaKdZ” compromised it. …

8 years ago

Miscreants hijacked the defunct SpamCannibal blacklist service

The SpamCannibal blacklist service was hijacked since Wednesday morning, attackers changed the DNS name server settings for the website overnight.…

8 years ago

Expert found a zero-day RCE in Microsoft Windows JScript component

Dmitri Kaslov, a security researcher at Telspace Systems, discovered a vulnerability in the JScript component of the Windows operating system…

8 years ago

US-CERT issued an alert on two malware associated with North Korea-linked APT Hidden Cobra

The Department of Homeland Security (DHS) and the FBI issued a joint Technical alert on two strain on malware, the Joanap backdoor…

8 years ago

CVE-2018-11235 flaw in Git can lead to arbitrary code execution

The Git community disclosed a dangerous vulnerability in Git, tracked as CVE-2018-11235, that can lead to arbitrary code execution when…

8 years ago

New Banking Trojan MnuBot uses SQL Server for Command and Control

Researchers at IBM X-Force Research team discovered a new Delphi-based banking Trojan dubbed MnuBot that leverages Microsoft SQL Server for communication with the…

8 years ago

Abusing Interactive Voice Response systems – Legacy Telecom [CVE-2018-11518]

A vulnerability tracked as CVE-2018-11518 could be exploited by attackers to power a phreaking attack on HCL legacy Interactive Voice Response…

8 years ago

EOS Node Remote Code Execution Vulnerability — EOS WASM Contract Function Table Array Out of Bounds

Security experts from the 360 Core Security Team have found and successfully exploited a buffer out-of-bounds write vulnerability in EOS…

8 years ago

This website uses cookies.