BlogHide Resteemsalanna27 (39)in telegram • 6 years agoTelegram Traffic was HijackedTelegram was hijacked by the Iranian state-owned telecommunications company. This action appeared to be a BGP hijacking, that is, an intermediary illegally controlled the IP address group, and the…alanna27 (39)in attack • 6 years agoThe Iran-linked APT group RASPITE is targeting US, Middle East, Europe, and East AsiaHacker group operating outside of Iran, called RASPITE, has been targeting facilities in the United States, Europe, the Middle East and East Asia. The organization has been active since at least…alanna27 (39)in bitcoin • 6 years agoHow Blockchain Technology is going to Revolutionize E-commerceBlockchain Technology is probably famous because of the Cryptocurrencies. But this technology has many other applications that stretch beyond Bitcoin, Ethereum and other virtual coins. The digital…alanna27 (39)in drupal • 6 years ago3rd-party libraries bug allows attacker to take full control of the affected Drupal websitesCritical vulnerabilities in the one of Drupal plugin were tracked, which could be exploited by attackers to take complete control of the affected Drupal site. An Attacker can use this bug to hack…alanna27 (39)in reddit • 6 years agoReddit Data Breaches: Emails, Passwords leakedThe US social news site Reddit announced on Wednesday that several of its systems were hacked, resulting in the theft of some user data, including the e-mail address currently used by the user and a…alanna27 (39)in malicious • 6 years agoASAP: Browser Extensions that Stealing Private InformationAdvertising blockade software developer ADGUARD recently released a report saying that advertising companies have developed a variety of applications and extensions for stealing private…alanna27 (39)in data • 6 years agoUK e-commerce provider data breaches: 1.3 million online fashion shoppers leakedBritish customers of online clothing and accessories shopping sites have experienced an unpleasant thing because their personal information has been confirmed to have been leaked. The data breach…alanna27 (39)in avast • 6 years agoAvast: Collecting data only improves CCleaner’s featureSince the acquisition of Piriform by security software company Avast last year, some popular applications, including CCleaner, have also been included in Avast. CCleaner was hacked for more than a…alanna27 (39)in android • 6 years agoAndroid Security Bulletin August 2018: fixed 43 vulnerabilitiesGoogle released Android Security Patch for August 2018 for all devices, this patch fixes many security vulnerabilities and other issues reported by users. These include two security patch levels…alanna27 (39)in web • 6 years agoPython Taint v0.39 released: Static Analysis Tool for Detecting Security VulnerabilitiesPython Taint Static analysis of Python web applications based on theoretical foundations (Control flow graphs, fixed point, data flow analysis)This report presents the static analysis too PyT…alanna27 (39)in crypto • 6 years agociphr: CLI crypto swiss-army knifeCiphr Ciphr is a CLI tool for performing and composing encoding, decoding, encryption, decryption, hashing, and other various operations on streams of data. It takes provided data, file data, or…alanna27 (39)in google • 6 years agoGoogle removes hundreds of Android apps that infected with Windows executable filesIt is essential for developers to download development tools from official channels, otherwise, it is very likely that they will install development tools with Trojans. In the past few years…alanna27 (39)in mikrotik • 6 years ago200,000 MikroTik Routers hijacked for cryptocurrency miningBrazil has been attacked by a well-designed cryptocurrency attack that has infected hundreds of thousands of routers across the country. The offense is still in progress, mainly affecting the…alanna27 (39)in apple • 6 years agoApple chip manufacturer TSMC factories infect virus, several factories go offlineAccording to AppleInsider, Apple’s iPhone and iPad chip foundry TSMC were attacked by computer viruses, and several factories were shut down on Friday. After the factory equipment was infected with…alanna27 (39)in wordpress • 6 years agoHackers use over 10,000 hacked WordPress sites to launch malvertising campaignRecently, network security company Check Point disclosed a massive malicious advertising attack. The attacker hijacks user traffic to gain black benefits by buying a website ad slot in a legal…alanna27 (39)in wordpress • 6 years agoPHP Code Execution Attack Puts WordPress Sites at RiskSam Thomas, a security researcher from Secarma, has discovered a new exploitation technique that could make it easier for hackers to trigger critical deserialization vulnerabilities in PHP…alanna27 (39)in apple • 6 years ago16-Year-Old Teen Hacked Apple Servers, Stole 90GB of Secure FilesThough Apple servers are widely believed to be unhackable, a 16-year-old high school student proved that nothing is impossible. The teenager from Melbourne, Australia, managed to break into…alanna27 (39)in scantron • 6 years agoScantron: A distributed nmap scanning frameworkDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages…alanna27 (39)in linux • 6 years agoLinux Malware Detect v1.6.3 releases: malware scanner for LinuxDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages…alanna27 (39)in owasp • 6 years agoOWASP ZAP w2018-08-20 released: pentesting tool for finding vulnerabilities in web applicationsDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages…