The Hacking News

Google Threat Analysis Group took down ten influence operations in Q2 2020

Google published its second Threat Analysis Group (TAG) report which reveals the company has taken down ten coordinated operations in…

4 years ago

NSA releases a guide to reduce location tracking risks

The United States National Security Agency (NSA) is warning of risks posed by location services for staff who work in…

4 years ago

UberEats data leaked on the dark web

Security researchers from threat intelligence firm Cyble have discovered user records of American online food ordering and delivery platform UberEats…

4 years ago

Updates provided by Red Hat for BootHole cause systems to hang

Red Hat is warning customers to not install the package updates released to address the BootHole vulnerability due to possible problems reported…

4 years ago

Doki, an undetectable Linux backdoor targets Docker Servers

Experts spotted an undetectable Linux malware that exploits undocumented techniques to evade detection and targets publicly accessible Docker servers Cybersecurity researchers at…

4 years ago

REMnux 7, a Linux toolkit for malware analysts released

A new version of the REMnux Linux toolkit for malware analysts is available for download, it includes a huge set…

4 years ago

Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack

Peripheral devices with unsigned firmware can expose Windows and Linux machines to hack, warn experts from firmware security firm Eclypsium.…

4 years ago

Expert released PoC exploits for recently disclosed Cisco DCNM flaws

A researcher has publicly released some proof-of-concept (PoC) exploits and technical details for flaws in Cisco’s Data Center Network Manager…

4 years ago

Security Affairs newsletter Round 238

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Hi folk, let…

4 years ago

PHP new versions fix multiple code execution issues

Maintainers at the PHP programming language have released new versions that address multiple flaws, including some code execution issues. The…

5 years ago

This website uses cookies.