Security Affairs

Cyber Defense Magazine – March 2019 has arrived. Enjoy it!

Cyber Defense Magazine March 2019 Edition has arrived. MARCH 2019 EDITION (RSA CONFERENCE PRINT EDITION & E-MAG COMING NEXT WEEK)…

7 years ago

2 HackerOne members received each over $1M via Bug programs

Bug bounty platform HackerOne announced that two of its members have each earned more than $1 million by participating bug…

7 years ago

Adobe releases patches to address ColdFusion 0day exploited in the Wild

Adobe has released out-of-band updates to address a critical flaw in ColdFusion web application development platform that has been exploited…

7 years ago

Cisco addressed CVE-2019-1663 RCE flaw in wireless routers

Cisco addressed CVE-2019-1663critical flaw in several wireless routers that could be exploited by attackers to remotely execute code on the…

7 years ago

Emissary Panda updated its weapons for attacks in the past 2 years

Experts analyzed tools and intrusion methods used by theChina-linked cyber-espionage group Emissary Panda in attacks over the past 2 years.…

7 years ago

Cybaze-Yoroi ZLab analyze GoBrut: A new GoLang Botnet

Cybaze-Yoroi ZLab analyze a new GoLang botnet named GoBrut, the investigation allowed to discover that the bot supports a lot…

7 years ago

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

Canadian media revealed that in November 2016, the International Civil Aviation Organization (ICAO) was a hit by a large-scale cyberattack.…

7 years ago

Cisco WebEx Meetings affected by a new elevation of privilege flaw

A vulnerability in the update service of the Cisco Webex Meetings Desktop App for Windows could allow elevation of privilege…

7 years ago

PDF zero-day samples harvest user data when opened in Chrome

Experts at Exploit detection service EdgeSpot detected several PDF documents that exploit a zero-day flaw in Chrome to harvest user…

7 years ago

Thunderclap vulnerabilities allows to hack most of moder computers

Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern…

7 years ago

This website uses cookies.