HACK CRASHES LINUX DISTROS WITH 48 CHARACTERS OF CODE
With just a mere 48 characters of code, Linux admin and SSLMate founder Andrew Ayer has figured out how to crash major Linux distributions by locally exploiting a flaw in systemd. AyerRead More →
With just a mere 48 characters of code, Linux admin and SSLMate founder Andrew Ayer has figured out how to crash major Linux distributions by locally exploiting a flaw in systemd. AyerRead More →
The newly-discovered bug gives attackers the chance to execute code through the open-source JPEG 2000 codec. Cisco Talos researchers have uncovered a severe zero-day flaw in the OpenJPEG JPEG 2000Read More →
For now, nobody’s pointing fingers at North Korea An unknown attacker has hacked South Korea’s military cyber command center last month, state officials told local media outlet Yonhap News. GovernmentRead More →
Researchers present new DefecTor deanonymization attack. A team of scientists has come up with a new attack method that in the hands of certain adversaries can be used to deanonymizeRead More →
On Monday morning, a number of professionals in the aerospace industry received a rather mundane email containing a PDF ostensibly about the future of Russian aerospace programs, but which actuallyRead More →
The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeingRead More →
Recent research on web security and related topics. Provided and maintained by members and friends of the Chair for Network and Data Security, Horst Görtz Institute, Ruhr-University Bochum. Do youRead More →
Microsoft is planning to make its internally-used ‘white-box fuzzing’ bug-detection service available to external customers and partners. Microsoft is looking for testers for a new bug-detection service that will runRead More →
Angry customer goes on rampage in a French Apple Store, destroys iPhones, MacBooks with a steel ball (video) A dissatisfied French customer took his rage to another level when heRead More →
Fraudsters who hack corporate bank accounts typically launder stolen funds by making deposits from the hacked company into accounts owned by “money mules,” willing or unwitting dupes recruited through work-at-home job scams.Read More →