Security Affairs

What Happens to Whistleblowers After They Blow the Whistle?What Happens to Whistleblowers After They Blow the Whistle?

What Happens to Whistleblowers After They Blow the Whistle?

Whistleblowers are a controversial subgroup of the modern workforce. What Happens to Whistle Site after they reveal uncomfortable truths? Whistleblowers…

7 years ago
4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device

4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device

The Misfortune Cookie flaw is threatening medical equipment that connects bedside devices to the hospital's network infrastructure. In December 2104,…

7 years ago
Air Canada data breach – 20,000 users of its mobile app affectedAir Canada data breach – 20,000 users of its mobile app affected

Air Canada data breach – 20,000 users of its mobile app affected

Air Canada data breach - The incident was confirmed by the company and may have affected  20,000 customers (1%) of…

7 years ago
What the Blockchain Taught Us about IT SecurityWhat the Blockchain Taught Us about IT Security

What the Blockchain Taught Us about IT Security

It is not just about security, but in utilizing Blockchain to secure your company and your information. With how fast…

7 years ago
CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011

CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011

Qualys experts discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least…

7 years ago
Data of 130 Million hotel chain guests offered for 8 BTC on Dark WebData of 130 Million hotel chain guests offered for 8 BTC on Dark Web

Data of 130 Million hotel chain guests offered for 8 BTC on Dark Web

A hacker is offering for sale the personal details of over 130 million hotel chain guests on a Chinese Dark…

7 years ago
Experts published a PoC code for Intel Management Engine JTAG flawExperts published a PoC code for Intel Management Engine JTAG flaw

Experts published a PoC code for Intel Management Engine JTAG flaw

A group of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. A…

7 years ago
The Rise of an Overlooked Crime – CyberstalkingThe Rise of an Overlooked Crime – Cyberstalking

The Rise of an Overlooked Crime – Cyberstalking

Cyberstalking is one of the most overlooked crimes. This is exactly why it is among the fastest growing crimes in…

7 years ago
Cryptocurrency Platform Atlas Quantum hacked, 260k users impactedCryptocurrency Platform Atlas Quantum hacked, 260k users impacted

Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted

The Cryptocurrency Platform Atlas Quantum suffered a security breach, information belonging to more than 260,000 users was stolen by hackers. Hackers…

7 years ago
Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wildCritical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild

Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild

According to the threat intelligence firm Volexity, the CVE-2018-11776 vulnerability is already being abused in malicious attacks in the wild. Just…

7 years ago