• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VMware warns of public PoC code for critical auth bypass bug CVE-2022-31656
  • Microsoft Patch Tuesday for August 2022 fixed actively exploited zero-day
  • Experts linked Maui ransomware to North Korean Andariel APT
  • Chinese actors behind attacks on industrial enterprises and public institutions
  • US sanctioned crypto mixer Tornado Cash used by North Korea-linked APT
  • Malicious file analysis - Example 01
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "Bash Bug"

Bash Bug

Reflections on Bash Bug case and evolution of IT security landscape

Security expert Boris Mutina made an analysis of IT Security landscape,...

October 9, 2014  By Pierluigi Paganini

Romanian Hackers exploited Bash Bug flaw to hack Yahoo servers

The security expert Jonathan Hall found evidence that a gang of Romanian...

October 7, 2014  By Pierluigi Paganini

Bash bug and risks posed by incomplete patches, discovered other two additional bugs

The security researcher Michal Zalewski revealed the details of other two additional...

October 5, 2014  By Pierluigi Paganini

Apple released a patch for the Shellshock vulnerability

Apple has just released its patch for the Shellshock vulnerability. The company...

September 30, 2014  By Pierluigi Paganini

ShellShock could be used to hack VoIP systems

Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability...

September 28, 2014  By Pierluigi Paganini

The majority Mac users safe from Bash Bug while Oracle warns its customers

Apple says users of its OS X are "safe by default" from the Bash Bug,...

September 28, 2014  By Pierluigi Paganini

Spike botnet runs DDoS attacks from IoT devices

Experts at Akamai spotted a new malware kit named Spike which is used by bad actors...

September 26, 2014  By Pierluigi Paganini

Hackers target Bash Bug vulnerability in the wild

The critical vulnerability Bash Bug in common GNU shell could be exploited...

September 26, 2014  By Pierluigi Paganini

Bash Bug is a critical risk to entire Internet infrastructure

Bash Bug is a critical flaw  remotely Exploitable which affects Linux,...

September 25, 2014  By Pierluigi Paganini


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT