Linux distro suffers hack on GitHub
Data breaches are always bad news, and this is peculiarly bad. Gentoo, a popular Linux distribution (or distro), has suffered the hacking of its repository on GitHub. The bad news is thatRead More →
Data breaches are always bad news, and this is peculiarly bad. Gentoo, a popular Linux distribution (or distro), has suffered the hacking of its repository on GitHub. The bad news is thatRead More →
Pentest specialists argue that social platforms can be a tool used for psychological warfare operations (PSYOPS) and malicious web campaigns, which is why Twitter has implemented new security features to identify andRead More →
Malicious software on third-party customer support product Inbenta Technologies caused the hack, the firm said on Twitter. “Some personal or payment information may have been accessed by an unknown thirdRead More →
During one of my engagements, I discovered some Windows devices that were affected by the MS17-010vulnerability. One of these devices caught my attention as it’s something I haven’t encountered yet –Read More →
The increased deals with cryptocurrencies such as Bitcoin and its various alternatives have led to the creation of coordinated phishing attacks from the so-called “Bitcoin Airdrops”. Computer users look forRead More →
According to Big Brother Watch, a British civil liberties defense organization, Her Majesty’s Revenue and Customs (HMRC) voice identification system has stored voice records from more than 5 million ofRead More →
A severe vulnerability affecting CISCO ASA and Firepower devices is being exploited after an exploit was released online, as revealed by late pentest. According to reports from the company itselfRead More →
Wi-Fi Alliance officially launched WPA3, the next-generation Wi-Fi security standard that, according to them, will eliminate all known security vulnerabilities and wireless attacks that occur today, including KRACK attacks. As pentest expertsRead More →
Fast food franchise PDQ has informed its customers that information of the cards with which they have made their purchases could be compromised due to a security breach in oneRead More →
Last week, the torrent portal The Pirate Bay was put offline and more than five days have passed without the website being online. The Pirate Bay visitors can see a briefRead More →
A new malware was discovered on sale for the amount of 50 dollars in its beta version, but promising the possibility of allowing customers to open their own botshop toRead More →
After issuing a patch, users are encouraged to make sure they are using the latest version of the browser. According to reports of experts in information security training fromRead More →
A researcher specialized in information security training recently discovered an Apple operating system failure that allows anyone with a Lightning cable the ability to bypass the password attempts limit ofRead More →
Information security training specialists report a new ruling from The Supreme Court, establishing that, in most cases, the Government will need an order to maintain long-term location surveillance using cell phone records,Read More →
If you were wondering how to receive the latest updates for Android apps installed through a third party, now you can do it directly from Google Play Store. For securityRead More →
We all know the media and information technologies play an important role in the political events of a country; therefore, it is important to think about their role onRead More →
TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home thermostats and more. The home WiFi network is a sacred place;Read More →
Cisco, a company dedicated to manufacturing telecommunications devices, launched patches for 34 failures in its software, including solutions for five critical vulnerabilities of arbitrary code execution in its operating system.Read More →
The attack allows any would-be-hacker to run as many passcodes as they want, without destroying the data. A security researcher has figured out how to brute force a passcode onRead More →
Symantec, a software developer, claims to have discovered a cyber espionage campaign focused on infiltrating three telecom operators in Southeast Asia, as well as a defense contractor and a satelliteRead More →