According to experts from the Fox-IT firm, the notorious Russian Snake APT group is ready to target also Mac users with a new variant of its malicious code. The sophisticated Russian Snake APT group is back and is leveraging on new malware to target Mac users.The Snake APT group, also known as Turla or Uroburos, has ported its Windows […]
A researcher reported a WordPress Password Reset vulnerability, tracked as CVE-2017-8295, and detailed it in a security advisory. On Wednesday, the popular security experts Dawid Golunski reported a WordPress Password Reset vulnerability, tracked as CVE-2017-8295, and detailed it in a security advisory. Golunski classified the flaw as a âmedium/high severity,â he explained that the issue is caused by […]
The company O2-Telefonica in Germany has confirmed to SĂŒddeutsche Zeitung agency that some of its customers suffered cyber heists exploiting the SS7 flaws. Security experts have been warning for years about security vulnerabilities affecting the SS7 protocol widely adopted in mobile communications. SS7, aka Signalling System No. 7, is a set of protocols used in telecommunications ever since the […]
The installation of monitoring software has been conducted either by NSA highly sophisticated hacking team or by hackers who leveraged the tools leaked by the Shadow Brokers. Last week, a collection of spy tools allegedly used by the National Security Agency for operations against global targets of interest was leaked online by the underground hacking group, […]
Don’t click Google Docs link! A Google Docs phishing scheme is quickly spreading across the Internet targeting a large number of users. Did you receive an unsolicited Google Doc from someone? First, do not click on that Google Doc link embedded in the email you have received and delete the message, even if it’s from […]
Experts from security firm WordFence reported a rapid reduction of WordPress attacks originating from hundreds of ISPs worldwide. Experts at the security firm Wordfence a few weeks ago reported that tens of thousands of flawed routers from dozens of ISPs worldwide were recruited in a botnet used to power several types of attacks against WordPress […]
A critical remote code execution vulnerability tracked as CVE-2017-5689 in Intel Management Engine affects Intel enterprise PCs dates back 9 years. A critical remote code execution (RCE) vulnerability tracked as CVE-2017-5689Â has been discovered in the remote management features implemented on computers shipped with Intel Chipset in past 9 years. The vulnerability affects the Intel Management […]
Kaspersky is currently monitoring the activities of more than 100 threat actors, from the From Lazarus APT to StoneDrill. According to the experts from KasperskyLab, the infamous Lazarus APT group, aka BlueNoroff, is the most dangerous threat against financial institutions worldwide. The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware […]
Ourmine hackers breached into the Unity Forum and informed its users that they had gained access to a database containing the details of 2 million records. The notorious hacker group OurMine made the headlines once again, this time the victim it the Unity Game Engine forum. The group has defaced and hacked the Unity forum over the […]
Yahoo awarded $7,000 to the bug hunter Michael Reizelman, aka mishre, for Flickr account hijacking vulnerability. Reizelman was a popular bug hunter that discovered vulnerabilities in many web services, including Badoo, Dropbox, GitHub, Google, Imgur, Slack, Twitter, and Uber. The expert has discovered three vulnerabilities in the companyâs image and video hosting service that could have been chained together […]