Skip to content

Cybersecurity News

  • Home
  • World Cyber News
  • TN CyberNews
  • Hacking
  • Cybersecurity
  • Technologies
  • Interviews
  • Events
  • Awarness
  • Pin Posts
  • Hacking

Billions of mobile, desktop and IoT devices potentially exposed to BlueBorne Attack

Haythem Elmir 8 ans ago
Billions of mobile, desktop and IoT devices potentially exposed to BlueBorne Attack

Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new stealthy remote attack dubbed BlueBorne attack. Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new remote attack, even without any user interaction and pairing. The unique condition […]

0 1
Share
  • Hacking

Compromised LinkedIn accounts used to send phishing links via private message and InMail

Haythem Elmir 8 ans ago
Compromised LinkedIn accounts used to send phishing links via private message and InMail

Phishing continues to be a criminals’ favorite for harvesting user credentials with more or less sophisticated social engineering tricks. In this post, we take a look at a recent attack that uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external […]

0 1
Share
  • Cybersecurity

ADOBE FIXES EIGHT VULNERABILITIES IN FLASH, ROBOHELP, COLDFUSION

Haythem Elmir 8 ans ago
ADOBE FIXES EIGHT VULNERABILITIES IN FLASH, ROBOHELP, COLDFUSION

Adobe fixed eight vulnerabilities across three products, including two critical memory corruption bugs and a critical XML parsing flaw, with its regularly scheduled update on Tuesday. RoboHelp for Windows, ColdFusion, and as usual, Flash Player, all received updates as part of the company’s Patch Tuesday security bulletins. Versions 26.0.0.151 and […]

0 1
Share
  • Cybersecurity

VMWARE PATCHES BUG THAT ALLOWS GUEST TO EXECUTE CODE ON HOST

Haythem Elmir 8 ans ago
VMWARE PATCHES BUG THAT ALLOWS GUEST TO EXECUTE CODE ON HOST

Users who run four different types of VMware products, ESXi, vCenter Server, Fusion and Workstation, are being encouraged to update to address a series of vulnerabilities, one critical. The most serious issue, an out-of-bounds write vulnerability, exists in ESXi, and desktop hypervisors Workstation, and Fusion. An attacker could exploit the […]

0 1
Share
  • Cybersecurity
  • World Cyber News

ANDROID USERS VULNERABLE TO ‘HIGH-SEVERITY’ OVERLAY ATTACKS

Haythem Elmir 8 ans ago
ANDROID USERS VULNERABLE TO ‘HIGH-SEVERITY’ OVERLAY ATTACKS

Security researchers warned of a high-severity Android flaw on Thursday that stems from what they call a “toast attack” overlay vulnerability. Researchers say criminals could use the Android’s toast notification, a feature that provides simple feedback about an operation in a small pop up, in an attack scenario to obtain […]

0 1
Share
  • Cybersecurity

Google Chrome most resilient against attacks, researchers find

Haythem Elmir 8 ans ago
Google Chrome most resilient against attacks, researchers find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabilities is certainly more complex today and requires a higher skill than in the past. […]

0 1
Share
  • Cybersecurity

Global DDoS mitigation market trends and developments

Haythem Elmir 8 ans ago
Global DDoS mitigation market trends and developments

Frost & Sullivan found that the DDoS mitigation market generated a revenue of $816 million in 2016 and is expected to register a CAGR of 17.1 percent through 2021. Threat actors’ continuous development of new techniques to overwhelm their target’s defenses and improve effectiveness of their DDoS attacks in terms of scale, […]

0 1
Share
  • Hacking
  • World Cyber News

More than 700 million email addresses leaked in huge data breach

Haythem Elmir 8 ans ago
More than 700 million email addresses leaked in huge data breach

A spambot has leaked more than 700 million email addresses and passwords publicly in a huge data breach. The data dump occurred thanks to a misconfigured spambot, dubbed ‘Onliner’, and was discovered by a Paris-based security researcher known as Benkow. Troy Hunt, an Australian computer security expert, who runs the […]

0 1
Share
  • Hacking

WikiLeaks suffers defacement at the hands of OurMine group

Haythem Elmir 8 ans ago
WikiLeaks suffers defacement at the hands of OurMine group

WikiLeaks’ whistleblowing website suffered an attack from the group known as OurMine on Thursday, when Julian Assange’s data-leaking site found itself on the receiving end of a ‘hack’. To read the original article : https://www.welivesecurity.com/2017/09/01/wikileaks-suffer-defacement-ourmine-group/

0 1
Share
  • Hacking
  • World Cyber News

Equifax confirms up to 400,000 UK consumers at risk after data breach

Haythem Elmir 8 ans ago
Equifax confirms up to 400,000 UK consumers at risk after data breach

One week after publicly revealing that a data breach had exposed the personal information and social security numbers of up to 143 million American consumers, the credit reporting agency has revealed more details of just how many people are affected in the UK. Although Equifax’s UK systems are said not […]

0 1
Share

Pagination des publications

Previous 1 … 184 185 186 187 188 189 190 191 Next
Cybersécurité en Tunisie. WordPress Theme: Seek by ThemeInWP