alanna27(25)•in #telegram•2699 days agoTelegram Traffic was HijackedTelegram was hijacked by the Iranian state-owned telecommunications company. This action appeared to be a BGP hijacking, that is, an intermediary illegally cont...24$0.00alanna27(25)•in telegram•2699 days agoTelegram Traffic was HijackedTelegram was hijacked by the Iranian state-owned telecommunications company. This action appeared to be a BGP hijacking, that is, an intermediary illegally cont...24$0.00
alanna27(25)•in #attack•2700 days agoThe Iran-linked APT group RASPITE is targeting US, Middle East, Europe, and East AsiaHacker group operating outside of Iran, called RASPITE, has been targeting facilities in the United States, Europe, the Middle East and East Asia. The organizat...11$0.00alanna27(25)•in attack•2700 days agoThe Iran-linked APT group RASPITE is targeting US, Middle East, Europe, and East AsiaHacker group operating outside of Iran, called RASPITE, has been targeting facilities in the United States, Europe, the Middle East and East Asia. The organizat...11$0.00
alanna27(25)•in #bitcoin•2700 days agoHow Blockchain Technology is going to Revolutionize E-commerceBlockchain Technology is probably famous because of the Cryptocurrencies. But this technology has many other applications that stretch beyond Bitcoin, Ethereum ...31$0.00alanna27(25)•in bitcoin•2700 days agoHow Blockchain Technology is going to Revolutionize E-commerceBlockchain Technology is probably famous because of the Cryptocurrencies. But this technology has many other applications that stretch beyond Bitcoin, Ethereum ...31$0.00
alanna27(25)•in #drupal•2701 days ago3rd-party libraries bug allows attacker to take full control of the affected Drupal websitesCritical vulnerabilities in the one of Drupal plugin were tracked, which could be exploited by attackers to take complete control of the affected Drupal site. A...23$0.00alanna27(25)•in drupal•2701 days ago3rd-party libraries bug allows attacker to take full control of the affected Drupal websitesCritical vulnerabilities in the one of Drupal plugin were tracked, which could be exploited by attackers to take complete control of the affected Drupal site. A...23$0.00
alanna27(25)•in #reddit•2701 days agoReddit Data Breaches: Emails, Passwords leakedThe US social news site Reddit announced on Wednesday that several of its systems were hacked, resulting in the theft of some user data, including the e-mail ad...21$0.00alanna27(25)•in reddit•2701 days agoReddit Data Breaches: Emails, Passwords leakedThe US social news site Reddit announced on Wednesday that several of its systems were hacked, resulting in the theft of some user data, including the e-mail ad...21$0.00
alanna27(25)•in #malicious•2702 days agoASAP: Browser Extensions that Stealing Private InformationAdvertising blockade software developer ADGUARD recently released a report saying that advertising companies have developed a variety of applications and extens...45$0.00alanna27(25)•in malicious•2702 days agoASAP: Browser Extensions that Stealing Private InformationAdvertising blockade software developer ADGUARD recently released a report saying that advertising companies have developed a variety of applications and extens...45$0.00
alanna27(25)•in #data•2702 days agoUK e-commerce provider data breaches: 1.3 million online fashion shoppers leakedBritish customers of online clothing and accessories shopping sites have experienced an unpleasant thing because their personal information has been confirmed t...260$0.00alanna27(25)•in data•2702 days agoUK e-commerce provider data breaches: 1.3 million online fashion shoppers leakedBritish customers of online clothing and accessories shopping sites have experienced an unpleasant thing because their personal information has been confirmed t...260$0.00
alanna27(25)•in #avast•2702 days agoAvast: Collecting data only improves CCleaner’s featureSince the acquisition of Piriform by security software company Avast last year, some popular applications, including CCleaner, have also been included in Avast....21$0.00alanna27(25)•in avast•2702 days agoAvast: Collecting data only improves CCleaner’s featureSince the acquisition of Piriform by security software company Avast last year, some popular applications, including CCleaner, have also been included in Avast....21$0.00
alanna27(25)•in #android•2703 days agoAndroid Security Bulletin August 2018: fixed 43 vulnerabilitiesGoogle released Android Security Patch for August 2018 for all devices, this patch fixes many security vulnerabilities and other issues reported by users. These...10$0.00alanna27(25)•in android•2703 days agoAndroid Security Bulletin August 2018: fixed 43 vulnerabilitiesGoogle released Android Security Patch for August 2018 for all devices, this patch fixes many security vulnerabilities and other issues reported by users. These...10$0.00
alanna27(25)•in #web•2704 days agoPython Taint v0.39 released: Static Analysis Tool for Detecting Security VulnerabilitiesPython Taint Static analysis of Python web applications based on theoretical foundations (Control flow graphs, fixed point, data flow analysis)This report...624$0.42alanna27(25)•in web•2704 days agoPython Taint v0.39 released: Static Analysis Tool for Detecting Security VulnerabilitiesPython Taint Static analysis of Python web applications based on theoretical foundations (Control flow graphs, fixed point, data flow analysis)This report...624$0.42
alanna27(25)•in #crypto•2704 days agociphr: CLI crypto swiss-army knifeCiphr Ciphr is a CLI tool for performing and composing encoding, decoding, encryption, decryption, hashing, and other various operations on streams ...20$0.00alanna27(25)•in crypto•2704 days agociphr: CLI crypto swiss-army knifeCiphr Ciphr is a CLI tool for performing and composing encoding, decoding, encryption, decryption, hashing, and other various operations on streams ...20$0.00
alanna27(25)•in #google•2704 days agoGoogle removes hundreds of Android apps that infected with Windows executable filesIt is essential for developers to download development tools from official channels, otherwise, it is very likely that they will install devel...1780$0.16alanna27(25)•in google•2704 days agoGoogle removes hundreds of Android apps that infected with Windows executable filesIt is essential for developers to download development tools from official channels, otherwise, it is very likely that they will install devel...1780$0.16
alanna27(25)•in #mikrotik•2704 days ago200,000 MikroTik Routers hijacked for cryptocurrency miningBrazil has been attacked by a well-designed cryptocurrency attack that has infected hundreds of thousands of routers across the country. The &n...1210$0.01alanna27(25)•in mikrotik•2704 days ago200,000 MikroTik Routers hijacked for cryptocurrency miningBrazil has been attacked by a well-designed cryptocurrency attack that has infected hundreds of thousands of routers across the country. The &n...1210$0.01
alanna27(25)•in #apple•2704 days agoApple chip manufacturer TSMC factories infect virus, several factories go offlineAccording to AppleInsider, Apple’s iPhone and iPad chip foundry TSMC were attacked by computer viruses, and several factories were shut down on Friday. Af...10$0.00alanna27(25)•in apple•2704 days agoApple chip manufacturer TSMC factories infect virus, several factories go offlineAccording to AppleInsider, Apple’s iPhone and iPad chip foundry TSMC were attacked by computer viruses, and several factories were shut down on Friday. Af...10$0.00
alanna27(25)•in #wordpress•2704 days agoHackers use over 10,000 hacked WordPress sites to launch malvertising campaignRecently, network security company Check Point disclosed a massive malicious advertising attack. The attacker hijacks user traffic to gain black ben...2730$0.00alanna27(25)•in wordpress•2704 days agoHackers use over 10,000 hacked WordPress sites to launch malvertising campaignRecently, network security company Check Point disclosed a massive malicious advertising attack. The attacker hijacks user traffic to gain black ben...2730$0.00
alanna27(25)•in #wordpress•2704 days agoPHP Code Execution Attack Puts WordPress Sites at RiskSam Thomas, a security researcher from Secarma, has discovered a new exploitation technique that could make it easier for hackers to trigger critical deserializ...22$0.00alanna27(25)•in wordpress•2704 days agoPHP Code Execution Attack Puts WordPress Sites at RiskSam Thomas, a security researcher from Secarma, has discovered a new exploitation technique that could make it easier for hackers to trigger critical deserializ...22$0.00
alanna27(25)•in #apple•2705 days ago16-Year-Old Teen Hacked Apple Servers, Stole 90GB of Secure FilesThough Apple servers are widely believed to be unhackable, a 16-year-old high school student proved that nothing is impossible. The teenager from Melbour...21$0.00alanna27(25)•in apple•2705 days ago16-Year-Old Teen Hacked Apple Servers, Stole 90GB of Secure FilesThough Apple servers are widely believed to be unhackable, a 16-year-old high school student proved that nothing is impossible. The teenager from Melbour...21$0.00
alanna27(25)•in #scantron•2705 days agoScantron: A distributed nmap scanning frameworkDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be h...10$0.00alanna27(25)•in scantron•2705 days agoScantron: A distributed nmap scanning frameworkDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be h...10$0.00
alanna27(25)•in #linux•2705 days agoLinux Malware Detect v1.6.3 releases: malware scanner for LinuxDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be h...871$0.01alanna27(25)•in linux•2705 days agoLinux Malware Detect v1.6.3 releases: malware scanner for LinuxDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be h...871$0.01
alanna27(25)•in #owasp•2705 days agoOWASP ZAP w2018-08-20 released: pentesting tool for finding vulnerabilities in web applicationsDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be h...20$0.00alanna27(25)•in owasp•2705 days agoOWASP ZAP w2018-08-20 released: pentesting tool for finding vulnerabilities in web applicationsDisclaimer: All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be h...20$0.00