Security Affairs

Massive attacks bypass MFA on Office 365 and G Suite accounts via IMAP Protocol

Threat actors targeted Office 365 and G Suite cloud accounts using the IMAP protocol to bypass multi-factor authentication (MFA). Over…

7 years ago

US-CERT warns of New Zealand mosque shooting scams and malware campaigns

In the wake of the New Zealand mosque shooting, the CISA recommends users to remain vigilant on possible scams and…

7 years ago

Israeli Candidate for PM Benny Gantz hacked by Iranian cyberspies

Israeli media reported this week that the Shin Bet internal security service warned Benny Gantz that Iranian cyber spies hacked…

7 years ago

German legislative body wants to tighten penalties against black marketplace operators

Germany's states have decided to criminalize black marketplace operators with the introduction of specific federal legislation. Germany's states have voted…

7 years ago

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Secur Solutions Group data leak - Another clamorous data leak made the headlines, personal information of 808,201 blood donors in…

7 years ago

It is the first time in the history that civic groups hold a protest against a national CERT

Demonstration in front of the National CERT of Philippines for failing to act on cyber attacks targeting regime critical media…

7 years ago

Recently fixed WinRAR bug actively exploited in the wild

Several threat actors are still exploiting a recently patched critical vulnerability in the popular compression software WinRAR. Several threat actors…

7 years ago

Experts published details of the actively exploited CVE-2019-0808 Windows Flaw

Experts from Qihoo 360 disclosed technical details of the actively exploited Windows zero-day flaw CVE-2019-0808 recently patched by Microsoft. Researchers…

7 years ago

A few binary planting 0-days for Windows

While we were thinking about a way to escalate privileges during a pen-test, we discovered that most Windows installations were…

7 years ago

GlitchPOS PoS Malware appears in the cybercrime underground

A new piece of PoS malware appeared in the threat landscape, the malicious code dubbed GlitchPOS has been found on…

7 years ago

This website uses cookies.