How to DDos deepweb .onion sites in just 4 commands?
A denial of service (DoS) attack is to force a failure of the target system by creating a condition in which users cannot access the attacked servers. A successful attackRead More →
A denial of service (DoS) attack is to force a failure of the target system by creating a condition in which users cannot access the attacked servers. A successful attackRead More →
A recent security report states that it is possible to hijack sessions on Google Compute Engine virtual machines to gain root access through a DHCP attack. While deploying this attackRead More →
Cybersecurity specialists report the detection of three critical vulnerabilities in virtualization solutions developed by the technology company Red Hat. According to the report, the successful exploitation of the vulnerabilities wouldRead More →
Cybersecurity specialists reported the finding of at least 4 critical vulnerabilities in CODESYS V2 Runtime Toolkit, a set of tools for CODESYS, the development environment for driver programming in accordanceRead More →
Cybersecurity experts report the detection of a botnet allegedly operated from China, infecting around 100 thousand devices according to the figures collected until June 2021. According to Avast’s report, theRead More →
Cybersecurity specialists reported the finding of multiple vulnerabilities in Drawings SDK, a development toolkit for accessing.dwg and .dgn data through an API developed by the Open Design Alliance. According toRead More →
Intel issued 29 security alerts to correct some severe bios firmware flaws for Intel processors, as well as in its Bluetooth products, the NUC Mini PC line, and in itsRead More →
This Tuesday afternoon, the security teams of tech firms Siemens and Schneider Electric published security alerts notifying the finding of dozens of security flaws present in various products. The patchesRead More →
A recent security report states that industrial switches created by major technology manufacturers could be affected by a specific set of vulnerabilities because they share the same firmware, developed byRead More →
Researchers at the University of Maryland developed a new attack variant that would force the slowdown of machine learning systems, resulting in critical server and application failures. This attack wasRead More →