Security Affairs

Thrangrycat flaw could allow compromising millions of Cisco devicesThrangrycat flaw could allow compromising millions of Cisco devices

Thrangrycat flaw could allow compromising millions of Cisco devices

Security firm Red Balloon discovered a severe vulnerability dubbed Thrangrycat, in Cisco products that could be exploited to an implant persistent…

6 years ago
North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenalNorth Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal

North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal

The North Korea-linked APT group ScarCruft (aka APT37 and Group123) continues to expand its arsenal by adding a Bluetooth Harvester.…

6 years ago
Malware Training Sets: FollowUPMalware Training Sets: FollowUP

Malware Training Sets: FollowUP

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which…

6 years ago
Unprotected DB exposed PII belonging to nearly 90% of Panama citizensUnprotected DB exposed PII belonging to nearly 90% of Panama citizens

Unprotected DB exposed PII belonging to nearly 90% of Panama citizens

Personally identifiable information belonging to roughly 90% of Panama citizens were exposed on a poorly configured Elasticsearch server. Security researcher…

6 years ago
CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

Security experts have found a race condition vulnerability (CVE-2019-11815) in Linux Kernel Prior to 5.0.8 that expose systems to remote…

6 years ago
Facebook sues data analytics firm Rankwave over alleged data misuseFacebook sues data analytics firm Rankwave over alleged data misuse

Facebook sues data analytics firm Rankwave over alleged data misuse

Facebook sues South Korean data analytics firm Rankwave over alleged data misuse and violation of social network's rules. Facebook filed…

6 years ago
Reading the Yoroi Cyber Security Annual Report 2018Reading the Yoroi Cyber Security Annual Report 2018

Reading the Yoroi Cyber Security Annual Report 2018

Yoroi Cyber Security Annual Report 2018 - In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure…

6 years ago
Over 10k+ GPS trackers could be abused to spy on individuals in the UKOver 10k+ GPS trackers could be abused to spy on individuals in the UK

Over 10k+ GPS trackers could be abused to spy on individuals in the UK

A vulnerability in a GPS tracker used by elderly people and kids could be exploited by an attacker to spy…

6 years ago
Expert discovered how to brick all Samsung mobile phonesExpert discovered how to brick all Samsung mobile phones

Expert discovered how to brick all Samsung mobile phones

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste…

6 years ago
Pacha Group declares war to rival crypto mining hacking groupsPacha Group declares war to rival crypto mining hacking groups

Pacha Group declares war to rival crypto mining hacking groups

Two hacking groups associated with large-scale crypto mining campaigns, Pacha Group and Rocke Group, wage war to compromise as much…

6 years ago