Myanmar President’s Office Hacked for the Second Time
A cyber-espionage hacking gang is suspected of breaking into the Myanmar president's office website and injecting a backdoor trojan into...
A cyber-espionage hacking gang is suspected of breaking into the Myanmar president's office website and injecting a backdoor trojan into...
Voentelecom has started implementing SIM cards that should create a "trusted environment" on smartphones. The transition to such SIM cards...
According to Rostelecom-Solar research, every 10th critical information infrastructure (CII) in the Russian Federation is compromised by malware. Even hackers...
Industrial switches that were given by the vendors have been affected by a same vulnerability, the reason being they all...
Introduction In a nutshell, email spoofing is the creation of fake emails that seem legitimate. This article analyzes the spoofing...
Helper plugin for analyzing UEFI firmware. This plugin contains the following features: Apply the correct prototype to the entry point...
Fuzz 403ing endpoints for bypasses Follow on twitter! @intrudirThis tool will check the endpoint with a couple of headers such...
Researchers found multiple flaws in the Realtek RTL8170C Wi-Fi module that could be exploited to elevate privileges and hijack wireless...
The US FBI announced that REvil ransomware gang (also known as Sodinokibi) is behind the attack that hit JBS Foods....
WizCase’s security team discovered an unsecured ElasticSearch server owned by AMT Games which exposed 1.47 TB of data. This leak exposed...
Cyber Defense Magazine June 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 129 pages of...
A critical zero-day vulnerability in the Fancy Product Designer WordPress plugin exposes more than 17,000 websites to attacks. Researchers from...
Summary: Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to...
Summary: An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability...
Summary: A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with...
Summary: Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had...
In April 2021, 13TB of compromised Dominos India appeared for sale on a hacking forum after which the company acknowledged...
This week another major supplier reported it had been hit with ransomware. After the Colonial Pipeline attack last month, this...
The ongoing multi-vendor investigations into the SolarWinds mega-hack took a new turn this week when additional malware artifacts were discovered...
Two independent investigations into an unauthorized data breach and the handling of sensitive information have been announced by the Reserve...
The Secretary of the Security Council also reported on cyber security threats in the draft of the new National Security...
Security researchers at imec-DistriNet Research Group have discovered the vulnerabilities in e-book reading systems that allow hackers to exploit the...
Nobelium, a Russian hacking group that was responsible for the 2020 SolarWinds cyberattacks, is back in the game, however, now,...