GiftGhostBot Botnet Attacked Nearly 1,000 Online E-Commerce Stores

8 years ago

A botnet specialized in gift card fraud is using the infrastructure of nearly 1,000 websites to check the balance of…

Apache Struts2 Remote Code Execution Vulnerability S2-046

8 years ago

Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code…

Possible credential attack vectors and ways to prevent credential based attacks

8 years ago

Password combined with username form credentials, nearly everything we do online require credentials in our modern world. To be secure, you're…

Intel OPTANE SSD, 375GB can be used as both as RAM & SSD

8 years ago

Intel revealed the Optane SSD DC P4800X. Optane SSD DC P4800X is a 375GB SSD (Solid State Drive) which is…

Chinese PUPs distributing Backdoored Drivers which affect Windows operating system

8 years ago

PUP(potentially unwanted program) packages that install's along with Chinese software's consist of backdoors targeting English speakers. The backdoor was uncovered…

Ask.com Toolbar Compromised Twice in 2 Months , Second Attack Installed RAT

8 years ago

Ask Partner Network (APN) has been compromised twice within 2 month since 2016 November. Researcher's Discovered deliver malware to computers…

MajikPOS Dual malware targeting businesses across North America and Canada

8 years ago

A new group of POS malware family made its presence targeting business systems around North America and Canada.The objective of…

Drupal releases Security update for Multiple Vulnerabilities

8 years ago

Drupal is a content management software. It's utilized to make a considerable amount of the websites and applications you utilize…

WhatsApp & Telegram Accounts Compromised By New Vulnerability that Allowed Hackers to Take over Hundreds of Millions of Accounts

8 years ago

Checkpoint Researchers Compromised Both Whatsup & Telegram chat applications which served by End-to -End Encryption.Both application designed with strong encryption…

“Super Malware” Steals Encryption Keys From Intel SGX Isolated Memory Fields

8 years ago

A scientist's Team from Graz University of Technology revealed the method that leaking theĀ  encryption data from Intel SGX (Software…