Pierluigi Paganini

Magento fixed a critical Magento SQL Injection flaw

There is an important news for administrators of e-commerce websites running over the Magento platform, Magento fixed a critical SQL…

7 years ago

Malware researchers decrypted the Qrypter Payload

Malware researchers at Cybaze-Yoroi ZLAB team dissected a new sample of Qrypter malware that revealed an interesting evolution of the…

7 years ago

Google developer disclosed Zero-Day flaw in TP-Link SR20 Routers

Google security developer Matthew Garrett disclosed a zero-day arbitrary code execution (ACE) vulnerability affecting the TP-Link SR20 routers. Google security…

7 years ago

New Shodan Monitor service allows tracking Internet-Exposed devices

Shodan IoT search engine announced the launch of a new service called Shodan Monitor designed to help organizations to maintain…

7 years ago

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

The recently patched vulnerability affecting the popular archiver utility WinRAR has been exploited to deliver new malware to targeted users.…

7 years ago

Lazarus APT continues to target cryptocurrency businesses with Mac malware

North Korea-linked Lazarus group made the headlines again, it has been leveraging PowerShell to target both Windows and macOS machines.…

7 years ago

Operation SaboTor – Police arrested 61 vendors and buyers in the dark web

Operation SaboTor - A coordinated operation conducted by law enforcement agencies from Europe, Canada, and the United States targeted vendors…

7 years ago

LUCKY ELEPHANT campaign targets South Asian governments

The NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign tracked as LUCKY ELEPHANT targeting mostly South Asian governments. Security…

7 years ago

Norsk Hydro estimates losses between $35M – $41M in the first week after cyberattack

Norwegian aluminum giant Norsk Hydro estimates more than $40 million losses in the first week following the ransomware attack that disrupted…

7 years ago

Experts found 36 vulnerabilities in the LTE protocol

A team of researchers from the Korea Advanced Institute of Science and Technology Constitution (KAIST) discovered 36 vulnerabilities in the…

7 years ago

This website uses cookies.