Pierluigi Paganini

Gaining remote code execution using a tainted SQLite database

Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in…

7 years ago

Boffins hacked Siemens Simatic S7, most secure controllers in the industry

A group of Israeli researchers demonstrated that it is possible to take over the Simatic S7 controller one of the…

7 years ago

10-year-old vulnerability in Avaya VoIP Phones finally fixed

Security researchers at McAfee have discovered that a vulnerability patched ten years ago is still affecting several Avaya phones.  Security…

7 years ago

City of Naples, Florida, lost $700K after a cyberattack

Another city in the United States was hit by a cyber attack, according to officials in the city of Naples…

7 years ago

Varenyky Spambot Trojan targets French users in alleged sextortion campaign

A new Spambot Trojan, tracked as Varenyky was spotted white targeting users as part of a new alleged sextortion campaign. The malware records…

7 years ago

Emsisoft released a free decryptor for JSWorm 4.0

Security researchers at Emsisoft have released a new decryptor tool that allows the victims of the JSWorm 4.0 ransomware to…

7 years ago

3Fun Dating App leaked members’ location and personal details

The 3Fun dating mobile app for "curious couples & singles" exposed the location of its members and their personal details.…

7 years ago

Apple announces major changes to its bug bounty program, including higher rewards

At the Blackhat cybersecurity conference, Apple has announced a few major changes to its bug bounty program that will be…

7 years ago

A Zero-Day in Steam client for Windows affects over 100 Million users

Two researchers publicly disclosed a zero-day vulnerability that affects the popular Steam game client for Windows, 0ver 100 million users…

7 years ago

WhatsApp flaws allow the attackers to manipulate conversations

Security experts at CheckPoint discovered a series of vulnerabilities in WhatsApp that could be exploited by attackers to tamper with…

7 years ago

This website uses cookies.