Pierluigi Paganini

Data of 130 Million hotel chain guests offered for 8 BTC on Dark Web

A hacker is offering for sale the personal details of over 130 million hotel chain guests on a Chinese Dark…

8 years ago

Experts published a PoC code for Intel Management Engine JTAG flaw

A group of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. A…

8 years ago

The Rise of an Overlooked Crime – Cyberstalking

Cyberstalking is one of the most overlooked crimes. This is exactly why it is among the fastest growing crimes in…

8 years ago

Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted

The Cryptocurrency Platform Atlas Quantum suffered a security breach, information belonging to more than 260,000 users was stolen by hackers. Hackers…

8 years ago

Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild

According to the threat intelligence firm Volexity, the CVE-2018-11776 vulnerability is already being abused in malicious attacks in the wild. Just…

8 years ago

Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day

A security researcher has publicly disclosed the details of zero-day privilege escalation vulnerability affecting all Microsoft's Windows operating systems A security…

8 years ago

Iran-linked COBALT DICKENS group targets universities in new phishing campaign

Experts from SecureWorks discovered a large phishing campaign targeting universities carried out by an Iran-linked threat actor COBALT DICKENS. Security…

8 years ago

Security firm attributes Cosmos Bank cyberheist to Lazarus APT

Security experts from Securonix have published a report that attributes the attack against on the Cosmos Bank to the Lazarus APT…

8 years ago

Experts warn of possible attacks after PoC code for CVE-2018-11776 Struts flaw was published

The Exploit code for the recently discovered Critical remote code execution vulnerability CVE-2018-11776 in Apache Struts 2 was published on GitHub, experts…

8 years ago

Android mobile devices from 11 vendors are exposed to AT Commands attacks

A group of researchers has conducted an interesting study on AT commands attacks on modern Android devices discovering that models…

8 years ago

This website uses cookies.