Security Affairs

Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware…

11 years ago

How hackers use Robots txt to harvest information

The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities.…

11 years ago

FBI: researcher hacked plane in-flight, causing it to “climb”

The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight…

11 years ago

APT28 hacking crew plans attacks on financial institutions

According to a report published by the experts at root9B the hacking crew APT28 is planning to attack several financial…

11 years ago

VENOM flaw, millions of virtual machines are vulnerable to attack

Security Researcher at CrowdStrike claims VENOM vulnerability leaves millions of virtual machines vulnerable to cyber attacks. A new security vulnerability…

11 years ago

95 percent of SAP systems were exposed to vulnerabilities

Onapsis study found that over 95% of SAP systems are exposed to vulnerabilities that could lead to full compromise of…

11 years ago

Traditional crooks and violent offenders are turning to the cybercrime

According to data provided by British law enforcement, at least a 25 percent of organised criminals in the country is…

11 years ago

Anonymous Hacker breached WTO database and Leaked data of internal staff

Hackers belonging to the Anonymous collective hacked the website of the World Trade Organization (WTO) and leaked personal data of…

11 years ago

Security Affairs newsletter Round 7 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

New Google Password Alert extension already hacked

A few hours after the presentation of the Google Password Alert extension a researcher already have developed two methods to bypass…

11 years ago

This website uses cookies.