Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy Today I’d like to share a full path analysis including a KickBack...
Federal prosecutors indicted a 20-year-old man who built the Satori botnet
Federal prosecutors indicted a 20-year-old man who built the Satori botnet A youngster (20) from Washington was indicted last week on feder...
BusyGasper spyware remained undetected for two years while spying Russians
BusyGasper spyware remained undetected for two years while spying Russians Security experts from Kaspersky Lab have uncovered a new strain ...
What Happens to Whistleblowers After They Blow the Whistle?
What Happens to Whistleblowers After They Blow the Whistle? Whistleblowers are a controversial subgroup of the modern workforce. What Happe...
A flaw in HP Remote Management hardware Integrated Lights-Out 3 leaves expose servers to DoS
A flaw in HP Remote Management hardware Integrated Lights-Out 3 leaves expose servers to DoS Hewlett Packard Enterprise issued a security p...
Microsoft released Windows Updates that include Intel’s Spectre microcode patches
Microsoft released Windows Updates that include Intel’s Spectre microcode patches Microsoft announced this week the release of the microcod...
Microsoft released Windows Updates that include Intel’s Spectre microcode patches
Microsoft released Windows Updates that include Intel’s Spectre microcode patches Microsoft announced this week the release of the microcod...
4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device
4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device The Misfortune Cookie flaw is threatening ...
Air Canada data breach – 20,000 users of its mobile app affected
Air Canada data breach – 20,000 users of its mobile app affected Air Canada data breach – The incident was confirmed by the company and may...
What the Blockchain Taught Us about IT Security
What the Blockchain Taught Us about IT Security It is not just about security, but in utilizing Blockchain to secure your company and your ...
22 Ways To Earn Cryptocurrency
22 Ways To Earn Cryptocurrency If you’re reading this you’re probably looking for ways to earn extra cash, am I right? You’ve probably seen...
22 Ways To Earn Cryptocurrency
22 Ways To Earn Cryptocurrency If you’re reading this you’re probably looking for ways to earn extra cash, am I right? You’ve probably seen...
CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011
CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011 Qualys experts discovered that OpenSSH is still vulnerable to ...
Data of 130 Million hotel chain guests offered for 8 BTC on Dark Web
Data of 130 Million hotel chain guests offered for 8 BTC on Dark Web A hacker is offering for sale the personal details of over 130 million...
Experts published a PoC code for Intel Management Engine JTAG flaw
Experts published a PoC code for Intel Management Engine JTAG flaw A group of security researchers has published a proof-of-concept exploit...
The Rise of an Overlooked Crime – Cyberstalking
The Rise of an Overlooked Crime – Cyberstalking Cyberstalking is one of the most overlooked crimes. This is exactly why it is among the fas...
Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted
Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted The Cryptocurrency Platform Atlas Quantum suffered a security breach, inf...
Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild
Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild According to the threat intelligence firm Volexity, the CVE-201...
Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day
Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day A security researcher has publicly disclosed the details of zero...
Victims of the GandCrab ransomware can decrypt their files for free using the decryptor
Victims of the GandCrab ransomware can decrypt their files for free using the decryptor The GandCrab ransomware decryptor has been released...
Victims of the GandCrab ransomware can decrypt their files for free using the decryptor
Victims of the GandCrab ransomware can decrypt their files for free using the decryptor The GandCrab ransomware decryptor has been released...
DPA Report: Russia-linked APT28 group hacked Germany’s government network
DPA Report: Russia-linked APT28 group hacked Germany’s government network Germany Government confirmed that hackers had breached its comput...
Iran-linked COBALT DICKENS group targets universities in new phishing campaign
Iran-linked COBALT DICKENS group targets universities in new phishing campaign Experts from SecureWorks discovered a large phishing campaig...
Security firm attributes Cosmos Bank cyberheist to Lazarus APT
Security firm attributes Cosmos Bank cyberheist to Lazarus APT Security experts from Securonix have published a report that attributes the ...
Experts warn of possible attacks after PoC code for CVE-2018-11776 Struts flaw was published
Experts warn of possible attacks after PoC code for CVE-2018-11776 Struts flaw was published The Exploit code for the recently discovered C...
Android mobile devices from 11 vendors are exposed to AT Commands attacks
Android mobile devices from 11 vendors are exposed to AT Commands attacks A group of researchers has conducted an interesting study on AT c...
Google researcher found Fortnite Android App vulnerable to Man-in-the-Disk attacks
Google researcher found Fortnite Android App vulnerable to Man-in-the-Disk attacks A Google security researcher disclosed a vulnerability i...
Israeli mobile forensics firm Cellebrite can unlock every iPhone device on the market
Israeli mobile forensics firm Cellebrite can unlock every iPhone device on the market The Israeli mobile forensics firm Cellebrite has desi...
With Android P Google Plans To Prevent Cellphone Spying Through Your Camera and Microphone
With Android P Google Plans To Prevent Cellphone Spying Through Your Camera and Microphone Android P, is expected to include a neat feature...
Evrial: The Latest Malware That Steals Bitcoins Using the Clipboard
Evrial: The Latest Malware That Steals Bitcoins Using the Clipboard Evrial is a cryptocoin malware stealer discovered by the researchers at...
Security Affairs newsletter Round 177 – News of the week
Security Affairs newsletter Round 177 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
USBHarpoon a look-like charging cable that can hack into your computer
USBHarpoon a look-like charging cable that can hack into your computer A team of security experts has devised a rogue USB charging cable na...
Personal details of 37,000 Eir customers exposed after the theft of a laptop
Personal details of 37,000 Eir customers exposed after the theft of a laptop Personal details of 37,000 Eir customers exposed after the the...
Australia banned Huawei from 5G network due to security concerns
Australia banned Huawei from 5G network due to security concerns Chinese-owned telecommunications firm Huawei has been banned from Australi...
AdvisorsBot, a previously undocumented downloader involved in malicious email campaigns
AdvisorsBot, a previously undocumented downloader involved in malicious email campaigns Security researchers at Proofpoint security have di...
The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach
The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach The restaurant chain Cheddar’s Scratch Kitchen suffered a...
The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach
The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach The restaurant chain Cheddar’s Scratch Kitchen suffered a...
Which is the worst cryptocurrency?
Which is the worst cryptocurrency? Let’s rank the top 10 coins from worst to best, because most of the bad coins are in there. Here, they a...
A new Cross-Platform Mirai Variant appeared in the wild
A new Cross-Platform Mirai Variant appeared in the wild A new cross-platform Mirai variant appeared in the threat landscape, this one has b...
T-Mobile data breach exposed personal information of up to 2 million customers
T-Mobile data breach exposed personal information of up to 2 million customers T-Mobile today announced It has suffered a security breach t...
North Korea-linked Lazarus APT uses first Mac malware in cryptocurrency exchange attack
North Korea-linked Lazarus APT uses first Mac malware in cryptocurrency exchange attack North Korea-linked Lazarus APT group leveraged for ...
Security Affairs newsletter Round 151 – News of the week
Security Affairs newsletter Round 151 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
Security Affairs newsletter Round 151 – News of the week
Security Affairs newsletter Round 151 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
Dozen vulnerabilities discovered in Trend Micro Linux-based Email Encryption Gateway
Dozen vulnerabilities discovered in Trend Micro Linux-based Email Encryption Gateway Security researchers at Core Security have discovered ...
How to put running process into background in Linux
How to put running process into background in Linux How to put running process to background ? Want to put current process to background a...
Expert found a flaw that affects all OpenSSH versions since 1999
Expert found a flaw that affects all OpenSSH versions since 1999 Security expert discovered a username enumeration vulnerability in the Ope...
Latest Turla backdoor leverages email PDF attachments as C&C mechanism
Latest Turla backdoor leverages email PDF attachments as C&C mechanism Malware researchers from ESET have published a detailed report o...
North Korea-linked Ryuk Ransomware used in a targeted campaign
North Korea-linked Ryuk Ransomware used in a targeted campaign Check Point reported that organizations worldwide have been targeted with th...
Bitdefender spotted Triout, a new powerful Android Spyware Framework
Bitdefender spotted Triout, a new powerful Android Spyware Framework Security researchers from Bitdefender have spotted a new Android spywa...
Operation Red Signature – South Korean Firms victims of a supply chain attack
Operation Red Signature – South Korean Firms victims of a supply chain attack Supply Chain Attack Hits South Korean Firms Security research...
Adobe security updates address 2 critical code execution flaws in Photoshop
Adobe security updates address 2 critical code execution flaws in Photoshop Yesterday Adobe released security updates for two critical code...