Hacking

Wannacry outbreak anniversary: the EternalBlue exploit even more popular now

WannaCry ransomware outbreak anniversary - According to researchers from ESET, the popularity of EternalBlue increase significantly over the past months.…

8 years ago

Google addresses critical security vulnerabilities in Chrome 66

Google released an updated version of Chrome 66 that addresses a Critical security vulnerability that could be exploited by an…

8 years ago

Throwhammer, the new Rowhammer attack to remotely hack systems over the LAN

  Security experts devised a new attack technique dubbed Throwhammer that could be exploited by attackers to launch Rowhammer attack on…

8 years ago

Mining passwords from dozens of public Trello boards

Trello, when an error in the publishing strategy is able to put at risk the private data of a huge…

8 years ago

Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFU

On May 4th Tech giant Telstra discovered a vulnerability in its service that could potentially expose customers of its cloud…

8 years ago

The source code of the TreasureHunter PoS Malware leaked online

  Security experts at Flashpoint confirmed the availability online for the source code of the TreasureHunter PoS malware since March. The researchers found…

8 years ago

Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack

Recently, the Advanced Threat Response Team of 360 Core Security Division detected an APT attack exploiting a 0-day vulnerability tracked as CVE-2018-8174.…

8 years ago

May 2018 Android Security Bulletin includes additional Meltdown fix

Google releases additional Meltdown mitigations for Android as part of the May 2018 Android Security Bulletin. The tech giant also addresses…

8 years ago

Are you using Python module ‘SSH Decorator’? Newer versions include a backdoor

A backdoor was discovered in the Python module named SSH Decorator (ssh-decorate), that was developed by Israeli developer Uri Goren.…

8 years ago

baseStriker attack technique allow to bypass Microsoft Office 365 anti-phishing filter

The baseStriker attack technique allows to bypass anti-phishing filters by splitting and disguising a malicious link using a tag called…

8 years ago

This website uses cookies.