Security Affairs

GAO report reveals new Pentagon weapon systems vulnerable to hack

According to a new report published by the Government Accountability Office (GAO) almost any new weapon systems in the arsenal…

7 years ago

CVE-2018-8453 Zero-Day flaw exploited by FruityArmor APT in attacks aimed at Middle East

A Windows zero-day flaw addressed by Microsoft with its latest Patch Tuesday updates is exploited by an APT group in attacks aimed…

7 years ago

Hackers can compromise your WhatsApp account by tricking you into answering a video call

Hackers can compromise your WhatsApp account by tricking you into answering a video call, the company fixed the flaw in…

7 years ago

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber…

7 years ago

Researchers presented an improved version of the WPA KRACK attack

Security researchers who devised last year the Key Reinstallation Attack, aka KRACK attack,  have disclosed new variants of the attack. Security…

7 years ago

Project Strobe, what will change after the Google security breach?

Google announced a security breach that may have exposed data of over 500,000 users of its Google+ social network, these…

7 years ago

BEC scams, hacked accounts available from $150 up to $5,000

Security experts from Digital Shadows have conducted an interesting study about the technique adopted by crooks to infiltrate company emails,…

7 years ago

Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it

This is a very bad news for Google that suffered a massive data breach that exposed the private data of over…

7 years ago

WECON PI Studio HMI software affected by code execution flaws

Security experts discovered several vulnerabilities in WECON's PI Studio HMI software, the company has verified the issues but has not…

7 years ago

Expert presented a new attack technique to compromise MikroTik Routers

Experts from Tenable Research have devised a new attack technique to fully compromise MikroTik Routers. MikroTik routers continue to be…

7 years ago

This website uses cookies.