Hacking

Oracle issues emergency patches for JOLTANDBLEED flaws

JoltandBleed - Oracle issued an emergency patch for vulnerabilities affecting several of its products that rely on the proprietary Jolt protocol. Oracle…

8 years ago

Kaspersky provided further details on NSA Incident. Other APTs targeted the same PC

Kaspersky Lab publishes a full technical report related to hack of its antivirus software to steal NSA hacking code. In…

8 years ago

Terdot Banking Trojan is back and it now implements espionage capabilities

The Terdot banking Trojan isn't a novelty in the threat landscape, it has been around since mid-2016, and now it is…

8 years ago

Cisco issued a security advisory warning of a flaw in Cisco Voice Operating System software

Cisco issued a security advisory warning of a vulnerability in Cisco Voice Operating System software platform that affects at least 12…

8 years ago

Formidable Forms plugin vulnerabilities expose WordPress sites attacks

A researcher from Finland-based company Klikki Oy has discovered several vulnerabilities in the Formidable Forms plugin that expose websites to attacks. The…

8 years ago

17-Year-Old MS Office flaw CVE-2017-11882 could be exploited to remotely install malware without victim interaction

Ops, a 17-Year-Old flaw in MS Office, tracked as CVE-2017-11882, could be exploited by remote attackers to install a malware…

8 years ago

Go to HELL, PowersHELL : Powerdown the PowerShell Attacks

Powerdown the PowerShell Attacks : Harnessing the power of logs to monitor the PowerShell activities Lately, I have been working…

8 years ago

A Backdoor in OnePlus devices allows root access without unlocking bootloader

Expert discovered a backdoor in OnePlus devices that allows root access without unlocking the bootloader. Other problems for the owners of…

8 years ago

Experts bypass ultra secure Apple iPhone X Face ID with a 3D-Printed mask

A group of researchers hacked Apple iPhone X Face ID facial recognition technology by using a 3D-Printed Mask that costs less than…

8 years ago

A China-linked cyber espionage group has been using a new strain of malware dubbed Reaver

Experts at Palo Alto Networks have discovered a new malware family named Reaver with ties to hackers who use the…

8 years ago

This website uses cookies.