Rowhammer attacks can bypass ECC memory protection
Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer attack, which makes the attack successful on ECC memory. Rowhammer is a group of exploits that exploit an error in the design of modern memory cards.
A memory card stores temporary data as s... Read more
Dropbox researchers accidentally found 3 zero days in Apple software
The Dropbox red team accidentally discovered a zero day in Apple software. While one of the company's teams was investigating how its software responds to cyber-attacks, it discovered a number of zero-day vulnerabilities.
The Offensive Security red team - a group of specialists tasked with attackin... Read more
Emotet malware includes unique infrastructure to prevent down-time
According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infrastructure of its server in two separate clusters.
Researchers analyzed 571 samples of the group's malware. It allowed them to extract the IP addresses of 721 Emotet command-and-control (C&... Read more
Hackers actively exploit second vulnerability in WordPress plugin
Hackers have been able to exploit a second vulnerability in a commonly used WordPress plugin in just one week. That's what sets WordPress security company Defiant against ZDNet. Right now, the attacks are being carried out.
It's the second separate wave of hack attempts against WordPress sites sinc... Read more
“Security company identifies hacker selling MySpace and Dropbox databases.
The American security company Recorded Future claims to have discovered the identity of a hacker who was behind the sale of a series of databases in 2016, reports among others ZDNet. The databases were of companies like MySpace, Badoo, Dropbox, LinkedIn and Twitter.
The hacker's pseudonym is Tessa8... Read more
New hack campaign focuses on governments worldwide
Palo Alto Networks Unit 42 security researchers have found a new hack campaign targeting government agencies around the world. The campaign is from the Sofacy Group and uses a series of armed documents, reports Silicon Angle.
Government agencies worldwide are being attacked by the hack group. These ... Read more
Thousands of sites on dark web offline after hacking on hosting provider
Daniel's Hosting, an important hosting provider on the dark web, has been hacked. As a result, approximately 6,500 websites are offline. Last Thursday, the hosting party was attacked by hackers, who got root access via phpmyadmin and adminer. That's what the hosting provider reports on its website. ... Read more
Antivirus programs do not see new malware that steals cryptic currency
EnSilo security researchers have found a new form of malware that can bypass antivirus programs. The malware used in the DarkGate campaign is used to steal cryptographic currency.
According to the researchers, DarkGate is now widely used in Spain and France, where it focuses on Windows computers via... Read more
Firefox now notifies you when you visit a hacked website
Mozilla adds a new security feature to Firefox Quantum. This makes it clear to users when they visit a website that has recently reported a data breach. In this way, users know whether their information is safe or not.
When a user visits a site that has recently or in the past reported a leak, a pop... Read more
WebCobra malware installs miners for monero and zcash
McAfee Labs reports that a new type of malware has been found that works as a cryptographic mineral. The malware bears the name WebCobra and takes over his victim's device. Then it starts with cryptographic currency mining, including zcash and monero. Of course, the earnings go to the hackers.
The t... Read more