Flaw in Intel Ethernet controller exposes to ‘packet of death’ attack

The hardware qualification is a very important issue, recent vulnerabilities discovered in network appliances of various manufacturer have alerted security community once again on the necessity to validate the hardware especially for large consume product. The last news is related to a vulnerability related to the Intel’s 82574L Ethernet controller that expose equipment to risk … Continue reading

AJAX (Programming)

Ajax is a group of interrelated web development techniques used on the client-side to create asynchronous web applications. With Ajax, web applications can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page. Data can be retrieved using the XMLHttpRequest object. … Continue reading

Bamital botnet servers seized by Microsoft and Symantec

Microsoft teamed up with Symantec to take down a nasty malware affecting thousands upon thousands of PCs. Bamital botnet hijacked people’s search experiences and redirected victims to potentially dangerous sites that could leave them vulnerable to other online threats and steal their personal information. Experts from the organizations obtained a court order and shut down servers at … Continue reading

Chinese malware campaign ‘Beebus’ target US defense industries

A Chinese malware campaign called ‘Beebus‘ specifically targeting the aerospace and defense industries has been uncovered by FireEye security researchers. Beebus is designed to steal information, and begins its infiltration, as so many attacks do, with spear-phishing emails. Operation Beebus very related to Operation Shady RAT and was first detected in April 2011. The attacks carried out by spear phishing attack and … Continue reading

Incapsula introduces ‘Backdoor Protect’ feature in Cloud-based Website Security

Incapsula announced this week that they’re offering an intriguing Backdoor Protection feature for sites using their cloud-based website security and performance services. What’s a Backdoor? A backdoor is a malicious function that enables hackers to remotely operate a site or server, even after whatever exploit they used for initial access has been patched. Installing a backdoor is … Continue reading

Apps on your phone could be stealing your data

How many apps do you have? On an average, on any given smartphone or tablet you will be sure to find at least six to seven apps, and it wouldn’t be a surprise if you were to find even more than twenty apps. Whether it’s a smartphone you are using or a tablet, your experience … Continue reading

nCircle patches PureCloud vulnerability scanner on Vulnerability-Lab report

  The Vulnerability-Laboratory Research Team discovered persistent and client side POST Injection web vulnerability in thenCircle PureCloud (cloud-based) Vulnerability Scanner Application. The vulnerability allows an attacker to inject own malicious script code in the vulnerable module on application side. Benjamin K.M. from Vulnerability-Laboratory provide more technical details about these flaws, the first vulnerability is located in the Scan Now > Scan Type … Continue reading

Malware stole 3000 confidential Documents from Japan ministry

Malware stole 3000 confidential Documents from Japan ministry Japan ministry become the recent victim of a cyber attack through a malware that suspected to have compromised and sent overseas more than 3,000 confidential documents from the ministry, including many on global trade negotiations. After investigation, experts found that Hackers use “HTran” the Advanced Persistant Threat (APT) exploit … Continue reading

Red Hat patches multiple web application Vulnerabilities

Red Hat patches multiple web application Vulnerabilities RED HAT has fixed multiple web application security issues that allowed hackers to extract website database using Blind SQL injection. Red Hat also confirmed a cross site scripting and Local File Inclusion Vulnerabilities on their website. Mohamed Ramadan Security Researcher and Trainer Attack-Secure, told ‘The Hacker News‘ that last year he reported 3 flaws to the … Continue reading

  • Calender

    December 2017
    M T W T F S S
    « Mar    
     123
    45678910
    11121314151617
    18192021222324
    25262728293031
  • Blog Stats

    • 10,911 hits
  • Upcoming Events

    No upcoming events