Blog Page 3

FormBook data stealer sold on hacking forums is used in targeted attacks

Security researchers from Arbor Networks and FireEye, have found a series of malware (dubbed FormBook) attacks primarily targeting aerospace, defense contractors, and manufacturing in...

Amazon’s Whole Foods Market Suffers Credit Card Breach In Some Stores

Another day, another data breach. This time Amazon-owned grocery chain has fallen victim to a credit card security breach. Whole Foods Market—acquired by Amazon for...

Code execution vulnerability (CVE-2017-12617) has been patched in Apache Tomcat

The Apache Tomcat team published that all versions of Tomcat before 9.0.1 (Beta), 8.5.23, 8.0.47 and 7.0.82 contain a possibly critical remote code execution...

2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw

A bug in Linux kernel that was discovered two years ago, but was not considered a security threat at that time, has now been...

The 2013 Data Breach Hit All Yahoo Accounts (3 Billion Accounts)

Yahoo! is a web services provider, that’s taken by Verizon this year through Oath Inc., the company now believes the total amount of accounts...

Equifax has announced that 2.5 Million More Users might have been affected by the...

Equifax published Monday that cybersecurity firm Mandiant developed the forensic portion of its investigation of the hack. The firm said in the statement that 145.5 million consumers...

Etherparty Ethereum ICO has been hijacked!

Etherparty is a smart contract creation tool that enables users to create smart contracts on the blockchain. It’s a user-friendly tool. Etherparty said that...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...