Hacking

SAFERVPN CVE-2018-10308 VULNERABILITY, FROM DOS TO DEANONYMIZATION

Researchers Paulos Yibelo explored a vulnerability he found in SaferVPN Chrome Extension. The vulnerability tracked as CVE-2018-10308 should help malicious…

8 years ago

BeatCoin – Researchers demonstrate how to steal Cold Wallet Keys from Air-Gapped PCs

Israeli researchers presented their new research named BeatCoin, it is an experiment wherein they demonstrate how to steal private keys for…

8 years ago

CSE Malware ZLab – Malware Analysis Report: The Bandios malware suite

The researchers at CSE ZLab have spotted a new family of malware, tracked as Bandios malware spreading in the wild. The…

8 years ago

Kaspersky’s analysis of servers compromised by Energetic Bear shows the APT operates on behalf of others

Kaspersky analyzed the serves compromised by the Energetic Bear APT and assumed with some degree of certainty that the group…

8 years ago

Google Project Zero hacker discloses a Zero-Day in Windows Lockdown Policy

Google researcher has publicly disclosed a Windows 10 zero-day that could be exploited by attackers to bypass Windows Lockdown Policy on…

8 years ago

Take These Steps to Secure Your WordPress Website Before It’s Too Late

You might have heard that WordPress security is often referred to as hardening, WordPress website security is all about putting…

8 years ago

CVE-2018-0229 flaw in SAML implementation threatens Firepower, AnyConnect and ASA products

Cisco has announced a set of security patches that address the CVE-2018-0229 vulnerability in its implementation of the Security Assertion Markup…

8 years ago

Security Affairs newsletter Round 159 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

8 years ago

Twitter bans Kaspersky from advertising its products through its platform

Twitter bans Kaspersky Lab from advertising its solutions on the platform citing DHS ban for its alleged ties with the…

8 years ago

Attackers Fake Computational Power to Steal Cryptocurrencies from equihash Mining Pools

Security experts at 360 Core Security have recently detected a new type of attack which targets some equihash mining pools. After…

8 years ago

This website uses cookies.