“Enter0” is selling access
There is a secretive online place called Exploit, which is like a dark web forum where hackers and cybercriminals gather to discuss and sell illegal things, like stolen data, hackedRead More →
There is a secretive online place called Exploit, which is like a dark web forum where hackers and cybercriminals gather to discuss and sell illegal things, like stolen data, hackedRead More →
Researchers from HackSys Inc. have provided further information on a security issue in the code execution of Foxit PDF Reader. On vulnerable installations of Foxit PDF Reader 11.2.1.53537, remote attackersRead More →
Relevant cybercriminal groups have been performing massive online scans to detect servers affected by a critical SAP vulnerability for which a fully functional exploit already exists. The flaw was trackedRead More →
Vulnerability testing specialists reported the emergence of an exploit for the Sony PS Vita console with which users can unlock the device to run games, apps, and emulators, among otherRead More →
Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks. Malware researchers at Trend Micro have spotted the first knownRead More →
The Joomla CMS project released today Joomla 3.7.1 to fix an SQL injection flaw that allows attackers to execute custom SQL code on affected systems and take over vulnerable sites.Read More →
One of the vulnerabilities used to spread the Stuxnet virus was 2016’s most popular exploit, according to telemetry data gathered by Russia cyber-security firm Kaspersky Labs. Identified as CVE-2010-2568, thisRead More →
Attackers with physical access are able to attack the firmware on many fully patched computers with DMA – Direct Memory Access. Once code execution is gained in UEFI/EFI Runtime ServicesRead More →
Scammers exploit the recent a wave of attacks to trick victims with phishing offensive and steal sensitive data from the unaware users. Crooks always exploits the media attention on tragicRead More →
Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the zero-day vulnerability and exploit acquisition firm recently launchedRead More →