Bad Bots – How To Fight Them and What Are They
Author: Asim Rahal
Bad internet bot traffic rose by 18.1% in 2019, and it now accounts for nearly one-quarter of all internet traffic
The figure above, which comes from Imperva’s 2020 Bad...
Facebook Sponsors 0day Exploit For Tails OS To Help The FBI Catch A Pedophile
Facebook helped the FBI catch a pedophile and sponsored the creation of a 0-day exploit for Tails
An amazing story was published on its pages by Vice Motherboard . It turned out that...
Fake SpaceX Youtube Channels Defraud 150,000 in Bitcoin
Journalists at Bleeping Computer warned that the scammers recently seized three YouTube channels, gave them new names associated with SpaceX, and then launched fake “broadcasts” with Elon Mask, during which they...
Strange Cmd.exe Command Allows Execution of Arbitrary Commands
Security researcher Julian Horoszkiewicz discovered a cmd.exe command line shell vulnerability that could allow arbitrary commands to execute.
In search of new attack vectors allowing the introduction of commands in Windows, Khoroshkevich...
Google is indexing the phone numbers of WhatsApp Users
A researcher is warning that Google is indexing the phone numbers of WhatsApp users raising serious privacy concerns.
Google is indexing the phone numbers of WhatsApp users that could be...
Coinsquare Database Leak Could Be Used For SIM Swapping
Recent Data Hack Could Put Millions of Dollars in Bitcoin at Risk
AUTHOR: FELIPE ERAZO via Coin Telegraph
Hackers have obtained over 5,000 email addresses from Coinsquare’s database and intend to...
All You Need To Know About Form Based Phishing Attacks
Author: Kyle Fedorek
Phishing methods have witnessed an evolution in the current landscape, coercing users into offering credentials. Researchers have warned people to keep an eye out for form-based phishing...
StrandHogg 2.0 – Android Flaw Leaves 1 Billion Devices Vulnerable to Application Hijacking
A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into...
New Malware Poisons NetBean Java Projects Github Warns
GitHub has issued a security alert on Thursday warning about a new malware strain that's been spreading on its site via boobytrapped Java projects.
The malware, which GitHub's security team...
Russian Military Hackers Sandworm Exploiting Mail Software Says NSA
By Sergiu Gatlan
The U.S. National Security Agency (NSA) says that Russian military threat actors known as Sandworm Team have been exploiting a critical flaw in the Exim mail transfer agent (MTA) software...