Vulnerability in Drupal CMS used for cryptomining
Drupal beside some things is also an open-source content management system (CMS) just like WordPress and is used by over a million websites across the globe. Drupal seems to beRead More →
Drupal beside some things is also an open-source content management system (CMS) just like WordPress and is used by over a million websites across the globe. Drupal seems to beRead More →
This injection technique allows the injected code to run before the entry point of the main thread of the process, thereby allowing avoiding detection by anti-malware products’ hooks. Code injectionRead More →
Intel has addressed vulnerability in the configuration of several CPU series that allow an attacker to alter the behavior of the chip’s SPI Flash memory, a mandatory component used duringRead More →
Just because Android tells you it’s patched and everything is safe doesn’t mean it is. But there’s an app to help you determine if you’re being told the truth. ItRead More →
Russian authorities are demanding a universal key. Telegram says it doesn’t exist. A Russian court has paved the way for the government to block the Telegram messaging app over itsRead More →
JSHielder is an Open Source tool developed to help SysAdmin and developers secure their Linux Servers in which they will be deploying any web application or services. According to information security expertsRead More →
It was revealed that Facebook has been collecting call records and SMS data from Android devices for years. Facebook has been using what it calls an “opt-in feature” to improveRead More →
This article, it’s an insight into the ransomware business and how it operates, with data gathered over a period of two years. Moreover, since ransomware largely transacts using Bitcoin, theRead More →
This post details the forensics performed by Information security trainingprofessional during the clean-up operation. The expert also note specific WordPress security recommendations based on analysis. Background The client had recently registeredRead More →
As criminals become more focused on the use of technology to commit a crime, online security has never been more essential. Private individuals and big businesses alike should constantly beRead More →