CIA project “Imperial” hacking tools leaked
WikiLeaks has detailed three leaked hacking tools, Achilles, Aeris and SeaPea, used to target Mac OS X and POSIX systems.
CIA project “Imperial” hacking tools leaked Read More »
WikiLeaks has detailed three leaked hacking tools, Achilles, Aeris and SeaPea, used to target Mac OS X and POSIX systems.
CIA project “Imperial” hacking tools leaked Read More »
A new attack that uses Docker containers to hide, persist and plant malware was demonstrated at Black Hat by a team of security researchers from Aqua Security.
Cyber attack targets Docker installations Read More »
Google security researchers have discovered and blocked a new form of spyware called Lipizzan that targets Android devices to spy on communications, such as email and calls, as well as steal information on contacts, record audio/video and monitor the target user’s location.
Lipizzan spyware targets Android devices Read More »
UniCredit has revealed that 400,000 customer accounts have been breached, exposing personal data and IBAN numbers.
UniCredit data breach linked to third party Read More »
A free vulnerability scanner, “Eternal Blues”, was developed in late June by a security director Elad Erez to scan for Microsoft Windows SMB Server vulnerabilities, such as those exploited by recent WannaCry campaign and EternalBlue-based attacks.
Eternal Blues vulnerability scanner Read More »
Security researchers in Belgium have discovered two vulnerabilities related to Single Sign-on authentication in Oracle Access Manager (OAM) Version 10g, as part of penetration testing work for a client.
Oracle SSO vulnerabilities Read More »
Hard Rock Hotels and Casinos have again warned of data breach after being notified of security incident through the hotel chain’s third party hotel reservation systems, The Sabre Hospitality Solutions SynXis.
Hard Rock Hotels and Casinos data breach Read More »
A team of security researchers from several universities have cracked the 1024-bit RSA encryption in theLibgcrypt cryptographic library used by GnuPG.
GnuPG crypto vulnerability exposed Read More »