If you use a Dell computer, then beware — hackers could compromise your system remotely. Bill Demirkapi, a 17-year-old independent security researcher, has discovered a critical remote code execution vulnerability in the Dell SupportAssist utility that comes pre-installed on most Dell computers. Dell SupportAssist, formerly known as Dell System Detect, checks the […]
Hacking
Financial and private data of dozens of IT giants’ leaked following a cyber attack at CITYCOMP
The affected companies include the names of Oracle, Airbus, Toshiba and Volkswagen. CITYCOMP revealed that it had fallen victim to a ‘targeted’ cyber attack in early April this year. Cybercriminals have hacked German-based CITYCOMP internet service provider in order to steal financial data of dozens of companies. The affected companies […]
‘Highly Critical’ Unpatched Zero-Day Flaw Discovered In Oracle WebLogic
A team of cybersecurity researchers today published a post warning enterprises of an unpatched, highly critical zero-day vulnerability in Oracle WebLogic server application that some attackers might have already started exploiting in the wild. Oracle WebLogic is a scalable, Java-based multi-tier enterprise application server that allows businesses to quickly deploy new products […]
‘Karkoff’ Is the New ‘DNSpionage’ With Selective Targeting Strategy
The cybercriminal group behind the infamous DNSpionage malware campaign has been found running a new sophisticated operation that infects selected victims with a new variant of the DNSpionage malware. First uncovered in November last year, the DNSpionage attacks used compromised sites and crafted malicious documents to infect victims’ computers with DNSpionage—a […]
Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts
If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by an unknown hacker or group of hackers, Microsoft confirmed The Hacker News. Earlier this year, hackers managed to breach Microsoft’s customer support portal and access information related to […]
Microsoft : un exploit WinRAR donne aux attaquants le « contrôle total » du PC Windows
Sécurité : Microsoft fait la lumière sur le travail d’un groupe de cybercriminels connu sous le nom de MuddyWater. Et ces pirates exploitent une vulnérabilité critique du logiciel de compression WinRAR combinée à du phishing. Microsoft détaille une attaque détectée en mars contre des clients Windows dans les secteurs des satellites et des […]
Popular Video Editing Software Website Hacked to Spread Banking Trojan
If you have downloaded the VSDC multimedia editing software between late February to late March this year, there are high chances that your computer has been infected with a banking trojan and an information stealer. The official website of the VSDC software — one of the most popular, free video editing and […]
Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password
Breaking — It has been close to just one year since the launch of next-generation Wi-Fi security standard WPA3 and researchers have unveiled several serious vulnerabilities in the wireless security protocol that could allow attackers to recover the password of the Wi-Fi network. WPA, or Wi-Fi Protected Access, is a standard designed to […]
The German chemicals giant Bayer hit by a cyber attack
The German chemicals giant Bayer confirmed that of a cyber attack, it confirmed the incident but clarified that no data has been stolen. The chemicals giant Bayer is the last victims of a cyber attack, it confirmed the incident, but pointed out the hackers haven’t stolen any data. According to the company, […]
More than 2 million Apache HTTP servers still affected by CVE-2019-0211 flaw
Security experts at Rapid7 have discovered that over 2 million Apache HTTP servers are still affected by the CVE-2019-0211 critical privilege escalation flaw. An important privilege escalation vulnerability (CVE-2019-0211) affecting the Apache HTTP server could be exploited by users with the right to write and run scripts to gain root […]