Brazilian Banking Trojan Communicates Via Microsoft SQL Server
Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control Read More
Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control Read More
The DNS rebinding flaw reported in Google Home and Chromecast devices earlier this week is about to get a patch — but the same type Read More
At least 25,936 malicious apps are currently using one of Facebook’s APIs, such as a login API or messaging API. These allow apps to access Read More
ThreatList: Bug Bounty Payouts Increase Six Percent for Critical Vulnerabilities HackerOne’s 2018 Hacker-Powered Security Report showed that the average award for critical vulnerabilities has increased. The Read More
Southeast Asian telcom giant Singapore Telecommunications Limited left approximately 1,000 customer routers wide open to a potential attack via an unprotected port. The flub occurred Read More
More than 22,000 container orchestration and API management systems are unprotected or publicly available on the internet – highlighting the reality of the risks of Read More
Researchers have created a proof-of-concept attack that allows unauthenticated adversaries to extract user credentials from misconfigured reverse proxy servers in order to delete, manipulate or Read More
A Facebook software bug in May switched the “suggested audience” for posts to “public” for 14 millions of users. The glitch meant Facebook users who Read More
Netflix expanded its bug bounty program on Wednesday opening it up to any white hat hacker and at the same time increased the top reward Read More
Researchers have identified a new variant of the SynAck ransomware that is now using the newly identified Process Doppelgänging to slip past antivirus programs. Researchers Read More