Embedded serial device servers built by Moxa and used in a number of critical industries remain vulnerable to three serious security issues that have not been patched by the vendor.
Browsing Category: Vulnerabilities
Wekby attackers are turning to the technique known as DNS tunneling in lieu of more conventional HTTP delivery of command and controls for remote access control of infected computer networks.
Researchers at Kaspersky Lab have identified six APT groups using exploits for a Microsoft Office flaw that was patched in September 2015.
Expert Troy Hunt waxes on last week’s LinkedIn data dump of 117 million credentials and how it reflects on a new breed of hackers.
Details of an extensive targeted attack against Swiss defense contractor RUAG were released by Switzerland’s national CERT.
The tenacious EITest malware campaign is being refueled by the fact it is shifting from the Angler exploit kit to the Neutrino exploit kit.
The Angler Exploit Kit is exploiting the latest Flash zero day and is moving Dridex banking malware. The Magnitude and Neutrino exploit kits have also integrated the 0day.
Microsoft warns of new technique to distribute macro malware that can evade standard virus detection, according to security experts.
Facebook paid researcher Arne Swinnen a $5,000 bounty for a pair of authentication vulnerabilities in Instagram that enabled brute-force attacks against usernames and passwords.
LinkedIn is striking back against websites that are attempting to monetize the 117 million usernames and passwords stolen from the company as part of a 2012 data breach.