Browsing category

Vulnerabilities

Microsoft Excel Files Increasingly Used To Spread Malware

Over the last few years we have received a number of emails with attached Word files that spread malware.  Now it seems that it is becoming more and more popular to spread malware using malicious Excel files. Lately, Fortinet has collected a number of email samples with Excel files attached (.xls, .xlsm) that spread malware […]

Verifone Investigates Gas Station Hack Attacks

Breach Affected About 24 U.S. Gas Station Stores, Payment-Terminal Maker Says. Major payment-terminal maker VeriFone Systems says that attackers managed to access its corporate network in January. But the San Jose, Calif.-based manufacturer says that the intrusion and related data breach was limited, has been contained and that any fallout appears to be minimal. News of […]

Spies do spying, part 97: Shock horror as CIA turn phones, TVs, computers into surveillance bugs

Nothing to fear, citizens. Keep consuming. Keep smiling. WikiLeaks has dumped online what appears to be a trove of CIA documents outlining the American murder-snoops’ ability to spy on people. The leaked files describe security exploits used to compromise vulnerable Android handhelds, Apple iPhones, Samsung TVs, Windows PCs, Macs, and other devices, and remote-control them […]

WordPress 4.7.3 released with patch for six security issues, but not for CSRF

Most expected WordPress 4.7.3 is now available for update. This security update covers six security issues that exists with WordPress version 4.7.2. Security issues: Cross-site scripting (XSS) via media file metadata. Reported by Chris Andrè Dale, Yorick Koster, and Simon P. Briggs. Control characters can trick redirect URL validation. Reported by Daniel Chatfield. Unintended files can be […]

To keep Tor hack source code secret, DOJ dismisses child porn case

DOJ: “Disclosure is not currently an option.” Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal prosecutors in Washington state have dropped all charges against a man accused of accessing Playpen, a notorious and now-shuttered website. The case, United States v. Jay Michaud, is one of nearly 200 cases […]

Third-Party Vendor Issues Temporary Patch for Windows GDI Vulnerability

A vulnerability discovered by Google Project Zero security researchers and left without a patch by Microsoft received a temporary fix from third-party security vendor ACROS Security. The vulnerability, tracked as CVE-2017-0038, is a bug in Windows GDI (Graphics Device Interface), a library that Windows uses to process graphics and formatted text, for both the video […]

Penetration testing with Metasploit made easy

Millions of IT professionals all over the world want to get into the hot field of security, and Metasploit is a great place to start. Metasploit Framework is free, used by more penetration testers than any other tool, and helps you understand security from the attackers perspective. There’s one problem: it’s hard to use Metasploit […]

HackerOne Offers Free Bug Bounty Programs for Open Source Projects

HackerOne, a platform that is offering hosting for bug bounty programs, announced today that open-source projects can now sign up for a free bug bounty program if they meet a few simple conditions. The new offering, named HackerOne Community Edition, is identical with HackerOne Professional Edition, the commercial service the company is offering to some […]

Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool

Researcher Discover “A logic vulnerability” dubbed ReBreakCaptcha to bypassing Google’s reCAPTCHA fields which is using for prevent from robots and abusive scripts to access sites  by using google’s Speech Recognition API. According to the Security Researcher , a bypass Technique called ReBreakCaptcha  which is used for bypass Google’s ReCaptcha v2 anywhere on the web. The proof-of-concept […]

BlackArch Linux 2017-03-01 Hacking Distro Released With 50 New Tools And Kernel 4.9.11

Short Bytes: The developers of BlackArch ethical hacking distro have released the new ISO images of their operating system. BlackArch Linux 2017-03-01 is now available with 50 new hacking tools, Linux kernel 4.9.11, and updated packages. The users can visit the BlackArch website and download the latest ISO images.  There are many categories of Linux distributions. Just […]

Yahoo cookie hacks affected 32 million accounts, CEO forgoes bonus

Nation-sponsored attackers targeted 26 specific accounts. Yahoo CEO Marissa Mayer said she’ll forgo her 2016 bonus and any stock award for this year after the company admitted it failed to properly investigate hack attacks that compromised more than a billion user accounts. “When I learned in September 2016 that a large number of our user […]

Two new Mac backdoors discovered

On Valentine’s Day, Mac users got a special “treat” in the form of new malware. Then, later that same week, there were signs of yet another piece of malware looming. These threats were overshadowed a bit by the discovery of the second ransomware app to ever appear on the Mac this week, but they’re still worthy of […]

Critical SQL Injection Vulnerability Found in NextGEN Gallery WordPress Plugin

The vulnerability can lead to attackers grabbing data from website database or user sensitive information. A new SQL Injection vulnerability was discovered in the NextGen Gallery plugin for WordPress, allowing users to grab data from the victim’s website database, which may very well include sensitive user information. The discovery was made by researchers from Sucuri […]