watering hole

Abusing Facebook Access Token with Man-in-the-Middle AttackAbusing Facebook Access Token with Man-in-the-Middle Attack

Abusing Facebook Access Token with Man-in-the-Middle Attack

The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user's traffic including access token.…

11 years ago
The marketing approach of cybercrime to phishing emailsThe marketing approach of cybercrime to phishing emails

The marketing approach of cybercrime to phishing emails

Mark Sparshott, director at Proofpoint, explained that cybercrime manages phishing emails using techniques similar to those used by the marketing…

11 years ago
Soghoian on government surveillance through service update processSoghoian on government surveillance through service update process

Soghoian on government surveillance through service update process

Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris…

11 years ago
New cyber attack against The Washington PostNew cyber attack against The Washington Post

New cyber attack against The Washington Post

Security experts at Mandiant have discovered that hackers break into Washington Post servers stealing employee users credentials hashes. Security experts…

11 years ago
Why do we need for Incident Response plan?Why do we need for Incident Response plan?

Why do we need for Incident Response plan?

Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing…

12 years ago
Energy industry warned over threat of cyberattacks, alarm raised by UAEEnergy industry warned over threat of cyberattacks, alarm raised by UAE

Energy industry warned over threat of cyberattacks, alarm raised by UAE

The energy industry continues to be a privileged target for cyber attacks of hacktivists, state-sponsored hackers and cybercriminals. The alarm…

12 years ago
Discovered Open URL Redirection flaw in FacebookDiscovered Open URL Redirection flaw in Facebook

Discovered Open URL Redirection flaw in Facebook

Researcher Dan Melamed recently discovered an open url redirection flaw in Facebook that allowed to have a facebook.com link redirect…

12 years ago
TrendLabs Q3 Security Roundup on illegal activitiesTrendLabs Q3 Security Roundup on illegal activities

TrendLabs Q3 Security Roundup on illegal activities

TrendLabs has just published the third quarterly report, titled The Invisible Web Unmasked, on the evolution of cybercrime observed in…

12 years ago
FireEye has identified a new IE zero-day exploitFireEye has identified a new IE zero-day exploit

FireEye has identified a new IE zero-day exploit

FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual…

12 years ago
A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906

A Zero-Day Vulnerability in Microsoft Graphics Component – CVE-2013-3906

Microsoft Zero-day CVE-2013-3906 - Microsoft informed to be aware of a vulnerability in a Microsoft graphics component that is actively…

12 years ago