SEVERITY: Medium ANALYSIS SUMMARY Attacks hitting financial organizations in West Africa since at least mid-2017 rely on off-the-shelf malware, free hacking tools, […]
SEVERITY: High ANALYSIS SUMMARY A massive Malspam campaign using zipped JavaScript (.js) files as malicious email attachments is discovered. The attachments begin with […]
Editor’s Note: This post was originally published on 28th October 2018 and is being continuously updated with latest information. Hackers have waged a sophisticated cyber-attack […]
Bloomberg Businessweek reported earlier this month that Chinese spies allegedly exploited the technical supply chain of 30 major US companies, including Apple and Amazon […]
A malicious JavaScript code had been planted within British Airway’s website, leading to data breach of around 380,000 accounts. RELEASE DATE: September 14th, 2018 […]
A vulnerability in Microsoft Windows Task Scheduler can be exploited to gain escalated privileges. IMPACT: MEDIUM PUBLISH DATE: 28-08-2018 OVERVIEW Elevated SYSTEM privileges can be gained […]
Red Hat has issued an update for postgresql. This fixes a vulnerability in which certain host connection parameters defeat client-side security defenses IMPACT: CRITICAL PUBLISH […]
A remote code execution vulnerability exists in various versions of Apache Struts which may take over the control of a system in case a successful attack. IMPACT: […]
THE SURFACE WEB The billions of accessible websites on the internet today seem to be overwhelming for a common man. What’s more surprising is that these […]