Black Hat SEO Campaign Leverages SQL Injections to Boost Search Rankings
A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flawsRead More →
A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flawsRead More →
Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series up to and including 4.3.16, and the 5.xRead More →
Intel acknowledges that Skylake processors freeze in the middle of work. A bug has been found in the Intel processors that can freeze any system confirms Intel. Dubbed as Skylake, theRead More →
Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals always exploit new opportunities and users’ bad habits, nowRead More →
A critical bug on eBay’s website opened the door for malicious hackers to create fake login pages to steal passwords and harvest credentials. An independent security researcher found the flawRead More →
CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the words “hacking” and “cyber” are introduced into theRead More →
API used a simple authentication scheme, exposing users to CSRF attacks that allowed third-parties to hijack accounts. Verizon fixed an issue in its My FiOS REST API that would haveRead More →
Russian ISP Eurobyte fails to answer Cisco’s emails, allows malvertising campaign to go on undisturbed. Cisco’s Talos research team has managed to identify and partially shut down a cyber-criminal group thatRead More →
First major automaker (aside from Tesla) to issue guidelines promising not to sue researchers. On January 5, General Motors quietly flipped the switch on Detroit’s first public security vulnerability disclosureRead More →
A number of weeks back, security researcher Parvez Anwar posted a number of DLL hijacking vulnerabilities within Microsoft Office on Twitter [1]. The following week, Microsoft released MS15-132, which addressedRead More →