Other problems for the Amazon Key technology, a hacker posted a video on Twitter to show how to access a locked door after a delivery worker’s one-time code has been used. Earlier in November, Amazon announced for its Prime members the Amazon Key, a program that would allow a delivery person […]
Année : 2018
Abusing X.509 Digital Certificates to establish a covert data exchange channel
Researcher at Fidelis Cybersecurity devised a new technique that abuses X.509 Digital Certificates to establish a covert data exchange channel Last year, during the Bsides conference in July 2017, the security researcher at Fidelis Cybersecurity Jason Reaves demonstrated how to covertly exchange data using X.509 digital certificates, now the same expert published the […]
Flaw in Grammarly’s extensions opened user accounts to compromise
A vulnerability in the Grammarly Chrome and Firefox extensions allowed websites to read users’ authentication tokes and use to them to log in to the users’ Grammarly accounts and access all the (potentially sensitive) information held in them. About the vulnerability The vulnerability was discovered by Google project Zero researcher […]
Three Leaked NSA Exploits Rewritten to Affect All Windows OSes Since Windows 2000
The WannaCry and NotPetya outbreaks were by far among the most significant digital attack campaigns that took place in 2017. Together, the crypto-ransomware and wiper malware affected hundreds of thousands of computers all over the world. They achieved this reach by abusing EternalBlue. Allegedly developed by the U.S. National Security […]
Ransomware Victims Hit on Average by Two Attacks per Year
A study of 2,700 IT professionals across the globe has revealed that 54% of organizations suffered a ransomware attack in the last year, and most organizations were hit more than twice, with the average number of ransomware per attacks being two. On average, every ransomware attack costs companies $133,000, but […]
Stripe.com – Phishing
A new entry to the phishing scams list today. This is asking for credentials for a new Online Payments Processor – Stripe.com. I haven’t previously heard of this company before or seen any phishing attempts against it. However a quick Google search does bring up a very small handful of […]
ADB.Miner worm is rapidly spreading across Android devices
A fresh threat to Android devices has managed to infect thousands of devices in days, researchers warn. In a blog post published Sunday, cybersecurity researcher Wang Hui from 360Netlab said a strain of cryptocurrency mining malware called ADB.Miner has begun spreading rapidly. The malware has similar capabilities to worms and […]
Fake Adobe Flash Update Sites Pushing CPU Miners
If you have ever been infected or have helped someone infected with adware, then you most likely have seen your browser being redirected to sites pretending to be Flash Player updates. Instead of a legitimate update, these sites normally push adware bundles that install further unwanted programs on an unsuspecting user. Today, […]
Authorities shut down Luminosity RAT used by buyers in 78 countries
The popular Luminosity RAT has been shut down by authorities and its users have no access to it anymore. In a joint operation, the law enforcement authorities from Australia, Europe, and North America have shut down a “hacking tool” called Luminosity Link RAT (Remote Access Trojan) also known as LuminosityLink. In the […]
Almost all WordPress websites could be taken down due to unpatched CVE-2018-6389 DoS flaw
The Israeli security researcher Barak Tawily a vulnerability tracked as CVE-2018-6389 that could be exploited to trigger DoS condition of WordPress websites. The expert explained that the CVE-2018-6389 flaw is an application-level DoS issued that affects the WordPress CMS and that could be exploited by an attacker even without a massive amount of malicious […]