Israel military said it bombed building housing Hamas cyber forces. Continue reading
Archive for May, 2019
Exploitable remotely/low skill level to exploit/public exploits are available Continue reading
Below follows an unofficial translation of the Annual Report 2018 of the Dutch General Intelligence and Security Service (GISS, known in Dutch as AIVD). The text below is ~9200 words in total. Hyperlinks and parts between [] brackets were added by me. Continue reading
The US DHS issued a new Binding Operational Directive (BOD 19-02) instructing federal agencies and departments to patch critical flaws in within 15 days.
Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool.
I am writing to inform you that personal information about you may have been involved in the recent cyberattack on Citrix. This notice contains information about the incident that occurred, as well as services Citrix is providing and additional steps you can take to protect yourself against any potential misuse of your personal information. We deeply regret that this incident occurred and take the security of employee information seriously. Continue reading
I recently disclosed 15 vulnerabilities in Crestron’s AM-100 and AM-101devices. Continue reading
Dell SupportAssist Client has been updated to address multiple vulnerabilities which may be potentially exploited to compromise the system. Continue reading
A “cyber event” interrupted grid operations in parts of the western United States last month, according to a cryptic report posted by the Department of Energy. Continue reading
With our internet-wide telemetry, RiskIQ has discovered some of the most significant Magecart attacks ever carried out. These involved a host of different tools and tactics including several different inject types, skimmers of varying sophistication, and countless intrusion methods. But for every Magecart attack that makes headlines, we detect thousands more that we don’t disclose. A considerable portion of these lesser-known breaches involves third-party payment platforms. Continue reading