When it comes to protecting yourself and your organization against cyber scams, there’s no “one-size-fits-all” solution. As organizations and people alike continue to adopt new devices and technology, they’re opening themselves up to more opportunities…Continue Reading
imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.
How To Use It’s simple…Continue Reading
Oracle has released its Critical Patch Update for October 2018, fixing 301 vulnerabilities across a wide range of its products, including Oracle Database Server, Oracle E-Business Suite, Oracle Java SE, and others.
“As with previous Critical Patch Upd…Continue Reading
Leaked data tranche of 8,700 documents purportedly includes tools that turn smart TVs into covert surveillance devices.
In what appears to be another major blow against a U.S. intelligence agency, whistleblower website WikiLeaks has publicly leaked 8,…Continue Reading
The cybersecurity landscape is changing daily as hackers continue to find ways to circumvent the latest technologies, presenting threats that could jeopardize the existence of your organization with the click of a mouse. As the persistence and sophisti…Continue Reading
Redhat JBoss Web Server 3.1 for RHEL 7 Redhat JBoss Web Server 3.1 for RHEL 6 Redhat Enterprise Linux Workstation Optional 7 Redhat Enterprise Linux Workstation 7 Redhat Enterprise Linux Workstation 6 Redhat Enterprise Linux Server Optional 7 Redhat En…Continue Reading
SuSE Suse Linux Enterprise Server 11-SECURITY SuSE OpenStack Cloud 6 SuSE Linux Enterprise Server for SAP 12 SP1 SuSE Linux Enterprise Server 12-SP1 SuSE Linux Enterprise Server 12-LTSS Redhat JBoss Web Server (JWS) 3.0 Redhat JBoss EWS 2 Redhat JBoss …Continue Reading
#1233389: KeyBoy Attacker Group Uses Publicly Available Exploit Code to Deliver Malware. The KeyBoy attacker group is using publicly available exploit code for two Microsoft security flaws to infect vulnerable machines with malware. Researchers at Alie…Continue Reading
#1233332: Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Kaspersky experts published a detailed analysis of the attacks conducted by the Russian-linked cyber espionage group DustSquad. Earlier October, security experts f…Continue Reading
The bug can be exploited to access the photos stored on a user’s device, and it’s been found in iOS12. A digital forensics specialist has discovered a vulnerability in Apple iOS’s VoiceOver feature that can be exploited by a malicious actor to gain acc…Continue Reading