Threats and Breaches

Threats and Breaches

Pentester Academy Command Injection ISO: Basilic 1.5.14 exploitation

Pentester Academy Command Injection ISO: Basilic 1.5.14 exploitation

/
Pentester Academy has launched a Command Injection ISO virtual image of Ubuntu. This image has 10 real-world application that has vulnerable application framework. Remote code execution is possible... Go on to the ...
Hackers Demanded $8K from Sacramento Regional Transit after Attack

Hackers Demanded $8K from Sacramento Regional Transit after Attack

/
Hackers demanded a ransom of approximately $8,000 after they attacked the Sacramento Regional Transit’s (SacRT) computer system. The attack occurred on 18 November, reports The Sacramento Bee, when unknown hackers defaced the ...
John Busso

How the Grinch (and his band of hackers) stole Christmas

/
In 2017 Hackers abound and we are all aware of it. However be aware that during the holiday season hackers are extra giving…of phishing attempts, malware, and Trojans, which all help them ...
IcedID - New Banking Trojan targets US-based companies with web injects

IcedID – New Banking Trojan targets US-based companies with web injects

/
The malware research team in the UAB Computer Forensics Research Lab is widening its horizon and is always on the look out for new malware families. While researching new malware families, Arsh ...

US intelligence can’t break vulnerability hoarding habit

/
Vulnerabilities: keep them secret as a weapon against the bad guys or tell the world so we can all get patched? ...

A week in security (November 13 – November 19)

/
Learn what happened in the world of security during the week of November 13 – November 19. Categories: Security world Week in security Tags: camcatphishingcyber mondayemailfraudGoogle Playmalwarephishweek in securityweekly roundup (Read more...) ...
2017-11-18_ITT.png

Weekly Cyber Risk Roundup: More Payment Card Breaches and Dark Web Arrests

/
Payment card breaches were back in the news again this week as Forever 21 announced that it is investigating a point-of-sale breach (POS) at some of its stores, and several other organizations ...

Vulnerability in Amazon Key

/
Amazon Key is an IoT door lock that can enable one-time access codes for delivery people. To further secure that system, Amazon sells Cloud Cam, a camera that watches the door to ...

What Is Vulnerability Management?

/
Enterprise networks regularly see change in their devices, software installations, and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate such risk by implementing foundational security controls ...

Ransomware via RDP (Remote Desktop Protocol)

/
For Sophos, Mark Stockley describes how scammers are using RDP, a tool intended to cut down network and system administration costs for companies by allowing sysadmins and help-desk operators to access their ...
Loading...