attack

  1. cageymaru

    New Magecart Attack Used a Compromised Advertising Agency to Deliver Its Payload

    Magecart Group 12 is suspected of compromising an ad agency that delivers advertising to eCommerce websites. By directly injecting payment skimming code into JavaScript libraries provided by French online advertising company, Adverline to its eCommerce customers, it enabled all websites embedded...
  2. cageymaru

    Final Fantasy XIV European Servers Are Currently Being DDoS Attacked

    The Final Fantasy XIV European servers are currently under a DDoS attack. The developers are looking into how the attacks are being made to formulate a plan for countermeasures. This DDoS attack has been affecting the service of paying customers since 9:09 a.m. (PDT). Players may be...
  3. cageymaru

    AT&T and Dedrone Team up to Protect Against Malicious Drones

    AT&T and Dedrone have teamed up to combat malicious drones near military bases, venues, cities, and businesses. Dedrone uses IoT sensors and LTE connectivity to detect, classify, mitigate, and localize drone-based threats. Drones are detected by radio frequency, visual, radar, and other sensor...
  4. DooKey

    'Instant Replay' for Computer Systems Shows Cyber Attack Details

    Cybersecurity researchers at the Georgia Institute of Technology are working to automate the process that investigators use to pinpoint how intruders enter a network, what data they took, and which computer were compromised. It's known as Refinable Attack INvestigation (RAIN) and it will...
  5. FrgMstr

    Don't Do KRACK - Breaking WPA2 WiFi Protocol

    Just when you thought that WPA2 was safe, think again. This new hack, called KRACK, Key Reinstallation Attack, is really really bad to put it in laymen's terms. Changing passwords does not make a difference. We will have to update firmware to fix this, and the IoT is likely going to make this...
  6. FrgMstr

    Manchester Arena Bombing Tweeted Hours Before

    When it comes to technology and privacy, we certainly have a lot of discussion about that around here. No matter where you stand on that, you have wonder how social media companies handle information publicly put out on its own networks. In the past few months there have been all kinds of...
  7. Seankay

    Has anyone got in touch with WanaCry people?

    There must be some victoims who would have contacted them. I am very much interested in knowing what they said. Please share with me if anyone find any story relating to it!
  8. Schtask

    Security Products Are No Match For The Double Agent

    Security researchers at Cybellum have identified a Zero-Day attack that grants full control over many Antivirus solutions on the market today. Born from the ashes of a 15 year old Microsoft tool, Cybellum has named this attack "Double Agent". Double Agent uses Microsoft's fairly ancient "MS...
  9. FrgMstr

    File-Less Malware Attack Uncovered & Identified

    Rule # 119 of the Cyber-Squirrel Handbook: Sometimes it's best not to taunt a Cyber Security Organization with hidden code in super stealthy malware. On the 24th of February, Twitter user Simpo posted a picture of a string of malicious code with the words "SourceFireSux" encoded in Base64...
  10. Zarathustra[H]

    New Windows 10 Zero Day Exploit Allows Attackers to Cause a System Crash

    Carnegie Mellon's Vulnerability Notes Database has a new alert up for an exploit that can allow a remote attacker to crash a Windows 10 machine. This exploit apparently works by taking advantage of a bug in how Windows 10 handles the SMB file sharing protocol. The only currently known...
  11. Gilthanis

    AndersonAttack@home

    http://parlea.ru/andersonattack/ The purpose of the project is to implement Anderson's attack on A5/1 GSM stream cipher. The attack's idea was described in the early 90's in a mailing group. As we know, it was never implemented in practice before. Anderson's attack belongs to a class of...
Back
Top