Security Affairs

Docker Hub Database hacked, 190,000 users impactedDocker Hub Database hacked, 190,000 users impacted

Docker Hub Database hacked, 190,000 users impacted

Docker became aware of unauthorized access to a Docker Hub database that exposed sensitive information for roughly 190,000 users. Docker…

6 years ago
Experts release PoC exploit for unpatched flaw in WordPress WooCommerce ExtensionExperts release PoC exploit for unpatched flaw in WordPress WooCommerce Extension

Experts release PoC exploit for unpatched flaw in WordPress WooCommerce Extension

WordPress-based eCommerce websites using the WooCommerce plugin are at risk of full compromise due to an unpatched vulnerability. A WordPress…

6 years ago
Cisco discovered several flaws in Sierra Wireless AirLink ES450 devicesCisco discovered several flaws in Sierra Wireless AirLink ES450 devices

Cisco discovered several flaws in Sierra Wireless AirLink ES450 devices

Experts at Cisco Talos group disclosed a dozen vulnerabilities in Sierra Wireless AirLink gateways and routers, including several serious flaws.…

6 years ago
Millions of IoT Devices exposed to remote hacks due to iLnkP2P flawsMillions of IoT Devices exposed to remote hacks due to iLnkP2P flaws

Millions of IoT Devices exposed to remote hacks due to iLnkP2P flaws

Experts discovered security flaws in the iLnkP2P peer-to-peer (P2P) system that exposes millions of IoT devices to remote attacks. Security…

6 years ago
Beapy Cryptojacking campaign leverages EternalBlue exploit to spreadBeapy Cryptojacking campaign leverages EternalBlue exploit to spread

Beapy Cryptojacking campaign leverages EternalBlue exploit to spread

Security experts uncovered a new cryptojacking campaign tracked as Beapy that leverages the NSA's DoublePulsar backdoor and the EternalBlue exploit.…

6 years ago
The strengths and weaknesses of different VPN protocolsThe strengths and weaknesses of different VPN protocols

The strengths and weaknesses of different VPN protocols

One in four internet users use a VPN regularly, but how much does the average user know about what goes…

6 years ago
Special-Purpose Vehicle Maker Aebi Schmidt Hit by MalwareSpecial-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

Special-Purpose Vehicle Maker Aebi Schmidt Hit by Malware

The special-purpose vehicle maker Aebi Schmidt was hit by a malware attack that disrupted some of its operations. The Aebi…

6 years ago
Crooks abuse GitHub platform to host phishing kitsCrooks abuse GitHub platform to host phishing kits

Crooks abuse GitHub platform to host phishing kits

Experts at Proofpoint discovered that free code repositories on GitHub have been abused since at least 2017 to host phishing…

6 years ago
Flaws in Social Warfare plugin actively exploited in the wildFlaws in Social Warfare plugin actively exploited in the wild

Flaws in Social Warfare plugin actively exploited in the wild

Experts uncovered hacking campaigns exploiting two critical security vulnerabilities in the popular WordPress plugin Social Warfare. Social Warfare is a…

6 years ago
Britain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G NetworkBritain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G Network

Britain ‘Approves’ Huawei role in building ‘non-core’ parts for 5G Network

British Government has approved a limited role for Huawei in the building of a national 5G network in the country,…

6 years ago