RÉSUMÉ De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d’entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service. SOLUTION Se référer au bulletin de sécurité de l’éditeur pour l’obtention des […]
Année : 2018
9 Tips to Prevent WordPress Hacks in this Dangerous Digital World
WordPress hacks are increasingly common. Whether it’s for malicious reasons, to harm a site or to just insert backlinks, WordPress can be very vulnerable if not cared for and updated regularly. How to Prevent hacks? So, how do you prevent these security blips – this post aims to show how. […]
For the second time CISCO issues security patch to fix a critical vulnerability in CISCO ASA
Cisco has rolled out new security patches for a critical vulnerability, tracked as CVE-2018-0101, in its CISCO ASA (Adaptive Security Appliance) software. At the end of January, the company released security updates the same flaw in Cisco ASA software. The vulnerability could be exploited by a remote and unauthenticated attacker to […]
Uber: ‘No Justification’ for Breach Cover-Up
Uber, the controversial ride-sharing company, arguably set the lowest bar after it waited a year before disclosing that hackers accessed 57 million accounts of its riders and drivers around October 2016. The breach was first disclosed in November 2017 (see Uber Concealed Breach of 57 Million Accounts for a Year). […]
Apple’s iBoot Source Code for iPhone Leaked on Github
Apple source code for a core component of iPhone’s operating system has purportedly been leaked on GitHub, that could allow hackers and researchers to discover currently unknown zero-day vulnerabilities to develop persistent malware and iPhone jailbreaks. The source code appears to be for iBoot—the critical part of the iOS operating […]
Credential phishing kits target victims differently depending on location
There is a new attack vector in town – the customization of phishing kits. In a recent case uncovered by PhishMe Intelligence, a phishing kit was crafted to target residents of specific regions using either TrickBot or Locky. Instead of determining what malware to deploy, this kit determined what personal […]
Ethereum Scammers Make $5,000 in a Night by Impersonating Celebs on Twitter
Online scammers have made over $5,000 worth of Ethereum in one night alone, showing how gullible some cryptocurrency users can be. Miscreants achieved this by creating fake Twitter profiles for real-world celebrities and spamming the social network with messages tricking users to participate in « giveaways. » Crooks deceived users into sending […]
Attackers can Steal Sensitive Data by Abusing CSS – CSS Exfil Vulnerability
CSS is a stylesheet language which provides a presentation for documents, all our modern websites heavily depend on the CSS. A new CSS vulnerability dubbed CSS Exfil can be used by attackers to steal data from the webpages using CSS. With the vulnerability, attackers can steal sensitive data’s including usernames, […]
Linkedin Phishing scam that only works in Firefox using data text urls
We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated. The email has a link to a site which contains a data:text base64 encoded content. data:text urls are dangerous and recently Internet Explorer and Google Chrome have stopped […]
Bangladesh to File U.S. Suit Over Central Bank Heist
Bangladesh’s central bank will file a lawsuit in New York against a Philippine bank over the world’s largest cyber heist, the finance minister said Wednesday. Unidentified hackers stole $81 million in February 2016 from the Bangladesh central bank’s account with the US Federal Reserve in New York. The money was […]