Security Affairs newsletter Round 293
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner....
A serious flaw in National Instruments CompactRIO controllers could allow remote attackers to disrupt production processes in an organization. A...
Safeguarding your authentication credentials is your best defense towards preventing your identity from falling into wrong hands. A recent...
Threat actors are actively exploiting a zero-day vulnerability in the popular Easy WP SMTP WordPress plugin installed on more than...
Spotify is informing users that their personal information might have been accidentally shared with some of its business partners. Spotify...
Facebook has suspended some accounts linked to APT32 that were involved in cyber espionage campaigns to spread malware. Facebook has...
The Minister of Digital Transformation Mikhail Fedorov said that his department is in contact with the team of the developer...
On Tuesday, Microsoft released fixes for 58 vulnerabilities for more than ten products for Windows and other software in their...
Tibetan community is being targeted by a Spear-phishing campaign; it is suspected that malicious actors behind these operations are...
GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its...
Carnivore is an assessment tool for Skype for Business, Exchange, ADFS, and RDWeb servers as well as some O365 functionality....
The US Cybersecurity Infrastructure and Security Agency and the FBI warned about the increase in ransomware attacks targeting the US...
Interview with Massimiliano Brolli, Head of TIM Red Team Research, which is a team of experts that focus on zero-day...
Microsoft warns of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing...
Cisco addressed a new critical RCE vulnerability that affects several versions of Cisco Jabber for Windows, macOS, and mobile platforms. Cisco...
The proof-of-concept exploit code for the Kerberos Bronze Bit attack was published online, it allows intruders to bypass authentication and...
Hello folks! If you have not heard yet, the security firm FireEye has had a breach of many red team...
Even though we hope that this is an unnecessary warning, we do want to put it out there. As soon...
Hacker groups APT28 and Fancy Bear may have been involved in a cyber attack on the Norwegian Parliament in August...
There is a rapid increase in the number of data breaches last year, jumping by 17%, which has become an...
The SideWinder advanced persistent threat (APT) group, which seems to be active since 2012, now has started a new malicious...
The coronavirus pandemic has caused sudden, sweeping change around the world. The necessary social distancing measures are having an impact...
Multi-threaded c2 server and reverse TCP shell client written in pure C (Windows). Command list: list: list available connections. interact...