GhostShell Returns, Exposes a Bunch of Companies with Open FTP Servers
GhostShell, the Romanian hacker who recently revealed his true identity in a very candid exposé, has returned to the world of hacking with a new leak as part of hisRead More →
GhostShell, the Romanian hacker who recently revealed his true identity in a very candid exposé, has returned to the world of hacking with a new leak as part of hisRead More →
Onapsis and US-CERT warned about attacks against 36 companies, another security firm begs to differ. The impact of a five-year-old security issue affecting SAP customers that has recently resurfaced has beenRead More →
The boom in PoS systems in the US has its drawbacks. Researchers from FireEye have disclosed the details of cyberattack group leveraging a Microsoft Windows zero-day flaw in targeted attacks againstRead More →
Hardcore fetish forum, Rosebutt Board hacked, traceable personal details leaked. The online hardcore fetish forum called Rosebutt Board was hacked by unknown hackers who leaked personal identifiable information of more thanRead More →
Allwinner’s ARM Linux kernel includes “rootmydevice” code that gives apps root. Allwinner, a Chinese system-on-a-chip company that makes the processor used in many low-cost Android tablets, set-top boxes, ARM-based PCs,Read More →
The information security plan describes how the security is implemented, defined policies, controls and solutions. The information security plan is developed considering all the IT resources depending on the securityRead More →
Exploits exist for both bugs and allow for remote code execution. Windows users woke up to something that doesn’t happen every day: the disclosure of two zero-day vulnerabilities, one in theRead More →
Whistleblowing is overshadowed when SQL injection gives way to unauthorized access. A Florida man has been slapped with felony criminal hacking charges after gaining unauthorized access to poorly secured computer systemsRead More →
Recorded Future’s real-time threat intelligence product allows analysts access to hundreds of thousands of sources that are normalized, organized, and searchable for analysis rather than simple keyword search. In thisRead More →
.. but security researchers already cracked it According to security experts from Cylance, in the underground world of ransomware peddlers, there’s no ransomware kit better than AlphaLocker, sold by a RussianRead More →