Attacks Against Windows PXE Boot Images
If you’ve ever run across insecure PXE boot deployments during a pentest, you know that they can hold a wealth of possibilities for escalation. Gaining access to PXE boot imagesRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
If you’ve ever run across insecure PXE boot deployments during a pentest, you know that they can hold a wealth of possibilities for escalation. Gaining access to PXE boot imagesRead More →
This note will explore the life cycle of an attack, how a victim may be infected and what an attacker could do to avoid detection by antivirus systems (AV). GeneralRead More →
Lizard Squad is a group of hackers that was dedicated to cause damage through DDoS attacks. Throughout their career they came to knock down many of the most popular services,Read More →
OnePlus has confirmed that more than 40,000 customers have been affected by an attack on the payment page by a malicious code has been operating capturing and sending information fromRead More →
If you haven’t updated your Windows app lately, now would be a good time. Makers of the Telegram instant messenger have fixed a critical vulnerability that hackers were actively exploitingRead More →
Every day we hear news of more malware endangering the information security of users. Therefore, the main companies, such as Dropbox, Google Drive and OneDrive, offer an advanced malware protectionRead More →
Winter Olympics officials have confirmed that a cyberattack occurred during the games’ opening ceremony on Feb. 9, but are remaining mum on the source of the attack. Researchers say theRead More →
The Information Commissioner’s Office (ICO) took down its website after a warning that hackers were taking control of visitors’ computers to mine cryptocurrency. Security researcher Scott Helme said more thanRead More →
Talos has identified a targeted attacks affecting the Middle East. This campaign contains the following elements, which are described in detail in this article. The use of allegedly confidential decoyRead More →
With a globally interconnected society, cases of harassment through the internet grow every day, although you have to know how to identify yourself when it comes to a crime orRead More →