Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. […]
Proof-of-concept iOS exploit released by Google’s Project Zero
A security researcher for Google’s Project Zero team has released a proof-of-concept iOS exploit that takes advantage of another Broadcom Wi-Fi issue. The vulnerability abused by Gal Beniamini, a security researcher for Google Project Zero based in Israel, was found in the same Broadcom BCM4355C0 Wi-Fi chips affected by the Broadpwn […]
Data Selfie: Révèler tout ce que Facebook sait de vous
Cet outil risque de changer votre comportement et votre relation avec Facebook et les autres médias sociaux. Nous voulons vous rendre vos données Facebook. Data Selfie est une extension du navigateur Google Chrome qui vous suit pendant que vous êtes sur Facebook pour vous montrer vos propres traces de données […]
Kazakhstan Banks hit by massive DDoS attack
According to local media, several banks in the country have faced a massive DDoS(Distributed Denial of Service) attacks over the past few days. The attack traffic came from several countries at the same time. As a result, bank websites were unavailable for a certain time. One of the affected bank […]
MacOS can be exploited to reveal keychain passwords, researcher warns
Launched just days ago, the latest release of Apple’s operating system for Macs contains a known zero-day vulnerability that could allow attackers to exfiltrate passwords from the user’s keychain. The flaw is also in older versions of macOS, so Mac users are are affected regardless of whether or not they upgraded their systems. Patrick […]
Industrial computer systems increasingly targeted by hackers, warns Kaspersky
Companies in the manufacturing, industrial and infrastructure sectors have been warned to tighten up their security as industrial control systems increasingly come under sophisticated attacks. The warning comes from security specialist Kaspersky, which has warned that computers used in industry have become prime targets for hackers. Kaspersky says that one […]
Guide to securing personal information
Introduction This ‘Guide to securing personal information’ (Guide) provides guidance on the reasonable steps entities are required to take under the Privacy Act 1988 (Cth) (Privacy Act) to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure. It also includes guidance […]
Une dizaine de sites web tunisiens ont été attaqué par AnonGhost
Le 28 Septembre 2017, une dizaine de sites tunisiens ont été attaqué par le groupe de pirate AnonGhost. L’attaque d’hier a visé des sites tunisiens qui sont hébergés sur le même serveur en France. Les sites sont : ysolutions.com.tn tarab.tn selfie.tn sidd.tn men.tn mhs.tn mobbyclick.tn staroil.tn radiosweb.tn tulipevents.tn L’attaque est de […]
TUNISIA BIG DATA HACKATHON 07 & 08 OCTOBRE 2017
TUNISIA BIG DATA HACKATHON 07 & 08 OCTOBRE 2017 Espace Arena LAC 1 The Tunisian e-government society est une association non gouvernementale, à but non lucratif œuvrant pour une implémentation éclairée des politiques de transformation administrative par l’usage des technologies du numérique. Tunisia Big Data Hackathon 2017 serait le 1er challenge en Tunisie qui […]
Elaborate scripting-fu used in espionage attack against Saudi Arabia Government entity
We recently came across a campaign targeting a Saudi Arabia Government entity via a malicious Word document which at first reminded us of an attack we had previously described on this blog. In our previous research, we detailed how an information stealer Trojan was deployed via a Word macro, in order […]