Hacking

Experts released an unofficial patch for Zero-Days in Dasan GPON home routers

Experts at vpnMentor released an unofficial patch for Zero-Days in Dasan GPON home routers manufactured by the company Dasan. Security experts…

8 years ago

Hackers continue to hack Drupal installs to install backdoors and inject cryptocurrency malware

Recently security experts discovered two critical vulnerabilities in the Drupal CMS (CVE-2018-7600 and CVE-2018-7602), and cybercriminals promptly attempted to exploit them in…

8 years ago

UPDATED – Critical RCE vulnerability found in over a million GPON Home Routers

Security researchers at VPNMentor conducted a comprehensive assessment on of a number of GPON home routers and discovered a Critical remote…

8 years ago

SynAck ransomware Employs Many Novel Techniques to Avoid Detection

The latest variant of the SynAck ransomware now includes a number of novel and complex anti-detection techniques, including one that…

8 years ago

European Central Bank announced a framework for cyber attack simulation on financial firms

Last week, the European Central Bank has published the European framework for testing financial sector resilience to cyber attacks. The framework…

8 years ago

New ZooPark APT targets Android users in Middle East since 2015

Security researchers from Kaspersky Lab have uncovered a new cyber-espionage APT group tracked ZooPark that targeted entities in the Middle East…

8 years ago

Spectre-NG – Researchers revealed 8 new varieties of the Spectre flaws

A group of security researchers has reportedly discovered 8 new varieties of the Spectre vulnerabilities, dubbed Spectre-Next Generation or Spectre-NG, that affect Intel CPUs. A German…

8 years ago

A bug in GandCrab ransomware V3 accidentally locks systems running Windows 7

The latest variant of the dreaded GandCrab ransomware,version 3, locks the infected systems running on Windows 7. A few days ago, experts…

8 years ago

GLitch attack, Rowhammer attack against Android smartphones now leverages GPU

A team of experts has devised the GLitch attack technique that leverages graphics processing units (GPUs) to launch a remote…

8 years ago

CVE-2018-2879 – Vulnerability in Oracle Access Manager can let attackers impersonate any user account

Security researchers have discovered a security vulnerability in Oracle Access Manager that can be exploited by a remote attacker to…

8 years ago

This website uses cookies.