Security Affairs

DoS flaw in several MikroTik Routers exploited in attacksDoS flaw in several MikroTik Routers exploited in attacks

DoS flaw in several MikroTik Routers exploited in attacks

A vulnerability could be exploited by attackers to trigger a denial-of-service (DoS) condition on devices running RouterOS. MikroTik routers made…

6 years ago
Magento Attacked Through Card Skimming ExploitMagento Attacked Through Card Skimming Exploit

Magento Attacked Through Card Skimming Exploit

Currently of 300,000+ Magento stores, the vast majority of the installs is still running vulnerable versions of the popular content…

6 years ago
Hackers can add, remove cancer and other illnesses from Computer Tomography scansHackers can add, remove cancer and other illnesses from Computer Tomography scans

Hackers can add, remove cancer and other illnesses from Computer Tomography scans

Researchers demonstrated that hackers can modify 3D Computer Tomography scans to add or remove evidence of a serious illness, including…

6 years ago
Xwo Malware scans the Internet for Exposed Services, Default PasswordsXwo Malware scans the Internet for Exposed Services, Default Passwords

Xwo Malware scans the Internet for Exposed Services, Default Passwords

Researchers at AT&T Alien Labs have spotted a malware called Xwo that is actively scanning the Internet for exposed web…

6 years ago
Ursnif: The Latest Evolution of the Most Popular Banking MalwareUrsnif: The Latest Evolution of the Most Popular Banking Malware

Ursnif: The Latest Evolution of the Most Popular Banking Malware

ZLab Yoroi-Cybaze dissected another attack wave of Ursnif Trojan, aka Gozi ISFB, an offspring of the original Gozi which source…

6 years ago
Flaws in Pre-Installed security App on Xiaomi Phones open to hack themFlaws in Pre-Installed security App on Xiaomi Phones open to hack them

Flaws in Pre-Installed security App on Xiaomi Phones open to hack them

If you use a Xiaomi smartphone you should be aware that a pre-installed security software could be abused for malicious…

6 years ago
Step By Step Office Dropper DissectionStep By Step Office Dropper Dissection

Step By Step Office Dropper Dissection

Malware researcher and founder of Yoroi Marco Ramill described a step-by-step procedure that shows how to dissect an Office dropper.…

6 years ago
More than 2 million Apache HTTP servers still affected by CVE-2019-0211 flawMore than 2 million Apache HTTP servers still affected by CVE-2019-0211 flaw

More than 2 million Apache HTTP servers still affected by CVE-2019-0211 flaw

Security experts at Rapid7 have discovered that over 2 million Apache HTTP servers are still affected by the CVE-2019-0211 critical…

6 years ago
Cisco fixes flaws RV320 and RV325 routers targeted in attacksCisco fixes flaws RV320 and RV325 routers targeted in attacks

Cisco fixes flaws RV320 and RV325 routers targeted in attacks

On Thursday Cisco announced new security patches to definitively address two vulnerabilities in Small Business RV320 and RV325 routers. Last…

6 years ago
NSA releases the source code of the GHIDRA reverse engineering frameworkNSA releases the source code of the GHIDRA reverse engineering framework

NSA releases the source code of the GHIDRA reverse engineering framework

NSA released the complete source code for its GHIDRA suite, the version 9.0.2 is available on the Agency's Github repository.…

6 years ago