MongoDB security – Injection attacks with php
Before we move on to the MongoDb injections, we must understand what MongoDb exactly is and why we prefer it over other databases. As MongoDb does not use SQL peopleRead More →
Before we move on to the MongoDb injections, we must understand what MongoDb exactly is and why we prefer it over other databases. As MongoDb does not use SQL peopleRead More →
The BadBlock Ransomware is one poorly coded and horribly designed ransomware as it not only encrypts your files, but also trashes your system. Unlike almost all other ransomware infections, BadBlock willRead More →
DNS Unlocker finds a way to hide hijacked DNS servers from human operators via one “special” character. A Potentially Unwanted Application (PUA) named DNS Unlocker has found a new way toRead More →
SECURITY FLAWS IN software can be tough to find. Purposefully planted ones—hidden backdoors created by spies or saboteurs—are often even stealthier. Now imagine a backdoor planted not in an application,Read More →
Targets multiple banks and WhatsApp users. During a regular hunt for malware, our researchers came across an interesting malicious Android app that portrayed itself as an online app for the reputable Russian bankRead More →
Remote-control tool wobbles offline, blames bad passwords for compromises. Updated TeamViewer users say their computers were hijacked and bank accounts emptied all while the software company’s systems mysteriously fell offline. TeamViewerRead More →
A new update to the CryptXXX Ransomware has made significant design changes to both the ransom notes and the TOR payment site. Previously, CryptXXX, like many other ransomware infections, copied the layoutRead More →
New study finds third-party updaters are riddled with critical vulnerabilities. The next time you’re in the market for a new Windows computer, consider this: if it comes from one of theRead More →
Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your way through modal dialogues for questionable software, andRead More →
Cyber security affects all of us, but it only makes the headlines when it’s big companies that are the target of attacks. Threat intelligence provider Anomali has produced a newRead More →