New: backdoorAll contenthive-129948hive-196917krsteemhive-183959photographyzzanhive-180932hive-166405hive-144064bitcoinuncommonlabhive-185836hive-183397hive-188619hive-150122krsuccesshive-124908hive-145157hive-101145lifehive-139150hive-109690hive-167213hive-103599TrendingNewHotLikersjustyy (82)in security • 7 months agoCheck Your OS for xz-utils BackdoorSee: TLDR; some developer named Jia Tan injected some backdoor in xz-utils, since he was trusted (he earned trusts by becoming a active contributor to the project) So, check the post above and…fajar.purnama (53)in computers • 4 years agoTrojan Horse Demonstration with Metasploit Framework PayloadFigure 0. Trojan Horse MSFpayload Illustration Note This is my undergraduate assignment that I translated to English myself in the Data Security System course where the task is to write an essay…fajar.purnama (53)in pentest • 5 years agoHaving a Taste of Being a Hacker0. Outline The world of a true hacker is a very complex but at the same time very exciting. The materials on hacking is very big, to us first hand knowledge of networking and programming is quite…skramatters (66)in tron • 5 years agoWe Sporked It 🤔 But I eat with my hands so....Due to my complete and utter disillusionment and lack of caring I will not be adding to what I'm sure is a plethora of steemcentric content. This platform has become a steem forum where the juicy…twr (53)in backdoor • 5 years agoResearchers Uncovered Malware That Drops Six Variants in One HitResearchers have uncovered a new malware campaign which they dub the “Hornets Nest”. What makes this attack notable is the deployment of six different malware variants in one go. These include…twr (53)in backdoor • 5 years agoHackers Deployed Fake UpdraftPlus Plugins With Backdoor To Infect WordPress WebsitesOnce again, hackers have devised a new strategy to infect WordPress websites. This time, researchers have found them exploiting fake WordPress plugins mimicking UpdraftPlus. These plugins possessing…czyouge (25)in sciencefiction • 5 years ago后门——一篇科幻小说后门 游行活动是在 Telegram 上组织的,竟也意外地获得了当局的批准,人们把这看作是一个标志性的事件,以为政治环境正开始转向开明。于是参加者不仅有深受 996 之苦的程序员和互联网从业者,也有一些自诩或互相恭称的「民主人士」。 付德林厌恶这些人。996.ICU…joined (42)in google • 5 years agoGoogle confirms: there was a backdoor pre-installed on some (rare) Android devicesOver the previous few hours, Google has released a case study of a extremely skilled hacker group that has consistently attempted to inoculate malware on Android smartphones over the years. In the…patrickdan (36)in backdoor • 5 years agoAppropriate Hiring Without an HR DepartmentProgress in the field of business has brought significant change in the working style now. New ideas are being welcomed in the industry. For the last few years, an important trend in hiring through…patrickdan (36)in backdoor • 5 years agoBackdoor hiring solutions- An introductionWhenever there are problems, we try to find the solutions. The recruitment agencies were the solution of hiring issues and have resolved the problem to a large extent. But now the problems are…emini (16)in hiddenwasp • 5 years agoHiddenWasp attacks Linux: severe backdoor discovery gives full control of the systemsLast Wednesday, the security signature of Intezer reported the existence of HiddenWasp, a new advanced Linux malware that has managed to circumvent antivirus detection and that has apparently…doifeellucky (64)in share2steem • 5 years agodoifeellucky's twitter FeedUnlucky 13: Mirai variant uses baker’s dozen of exploits to compromise IoT devices #share2steem #malware #mirai #backdoor #infosec External Link : Mirai variant uses baker's dozen of…doifeellucky (64)in share2steem • 5 years agodoifeellucky's twitter FeedGreat video from @The_HatedOne_! How Intel wants to backdoor every computer in the world | Intel Manageme... via @YouTube #share2steem #intel #backdoor #ime #minix How Intel wants to…kilab (25)in dtube • 6 years agoHow Intel wants to backdoor every computer in the world | Intel Management Engine explainedIntel embeds Management Engine into all of its computers since 2008. Intel Management Engine has been criticized for its security risks and has been called a backdoor with rootkit possibilities by…kilab (25)in dtube • 6 years agoThe Microsoft Windows _NSAKEY backdoorMicrosoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is the…doifeellucky (64)in share2steem • 6 years agodoifeellucky's twitter Feed : 2019/03/12 14:31:09Gaming industry still in the scope of attackers in Asia via @welivesecurity #share2steem #hacking #games #backdoor #infosec External Link : Gaming industry still in the scope of…twr (53)in apache • 6 years agoNew Linux Backdoor "SpeakUp" Found Exploiting Flaws In Multiple Linux DistrosResearchers have discovered a new Trojan campaign that creates a Linux backdoor. Referred to as SpeakUp, the backdoor malware exploits multiple vulnerabilities in different distros. The malware…twr (53)in advancedpersistentthreat • 6 years agoIranian Cyber Espionage Group APT-39 linked to Middle East attacksFireEye has dubbed and exposed Iranian cyber espionage group APT39, as actors of a series of attacks on the Middle East. After 5 years of observing its patterns and behaviours, it found links…twr (53)in backdoor • 6 years agoWordPress Plugin Hacked By Former EmployeeIn the past few days, a popular WordPress plugin has had to contact all of its customers after its plugin was hacked. Named, WPML (WP MultiLingual), the plugin is one of the most popular for…kaarosu (25)in wordpress • 6 years agoCrear Backdoor en WordPressBackdoor en WordPress. Los backdoor son una de las herramientas más utilizadas, de forma maliciosa o no, para acceder a sistemas de usuarios. Descargar script + explicación de uso ▶️ DTube ▶️ IPFS