[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Oracle pushed out an emergency update for vulnerabilities affecting several of its products that rely on its proprietary Jolt protocol. The bugs were discovered by researchers at ERPScan who named the series of five vulnerabilities JoltandBleed. The vulnerabilities are severe, with two of the bugs scoring 9.9 and 10 on the CVSS scale.  Products affected […]

IT News

The share of Linux botnets is continuing to grow—accounting for 70% of attacks in Q3, compared to 51% in Q2. According to Kaspersky Lab’s Q3 2017 DDoS Intelligence Report, experts have continued to see an increase in the number of countries where resources have been targeted, with 98 countries subjected to DDoS attacks in the […]

IT News

US federal prosecutors in Minnesota have charged a 46-year-old man with hiring a cyberhitman – well, technically, three hacking services – to launch a year-long campaign of distributed denial of service (DDoS) attacks on his former employer. Prosecutors say that John Kelsey Gammell, 46, contacted seven DDoS services and paid monthly subscriptions to three of […]

IT News

Poor mobile app development practices have created the Eavesdropper vulnerability, which has resulted in a large-scale data exposure from nearly 700 apps in enterprise mobile environments, over 170 of which are live in the official app stores today. The affected Android apps alone have been downloaded up to 180 million times. According to researchers at […]

IT News

Amazon announced a series of new security features for its cloud platform on Nov. 8, providing users with enhanced capabilities to help protect S3 storage buckets and virtual private cloud (VPC) endpoint connections. The company is launching the new Amazon Web Services (AWS) security features ahead of its re:invent conference, which runs from Nov. 27 […]

IT News

Code hosting service GitHub now warns developers if certain software libraries used by their projects contain any known vulnerabilities and provides advice on how to address the issue. GitHub recently introduced the Dependency Graph, a feature in the Insights section that lists the libraries used by a project. The feature currently supports JavaScript and Ruby, […]

IT News

A recently observed Zeus Panda banking Trojan attack used poisoned Google search results for specific banking related keywords to infect users, Cisco Talos researchers warn. As part of this attack, the actor behind Zeus Panda used Search Engine Optimization (SEO) to make their malicious links more prevalent in the search results. By targeting financial-related keyword […]

PayPal informed customers on Friday that personal information for 1.6 million individuals may have been obtained by hackers who breached the systems of its subsidiary TIO Networks. TIO is a publicly traded bill payment processor that PayPal acquired in July 2017 for roughly $230 million. The company is based in Canada and it serves some […]

Google is cracking down on unwanted and harmful Android apps with a new effort that will show warnings on applications and on third-party websites distributing apps that collect personal data without user consent. The effort is an expansion of the Google Safe Browsing team’s mission to enforce the company’s recently updated Unwanted Software Policy for […]

A German security researcher has discovered a group of vulnerabilities in various email clients, collectively dubbed Mailsploit, which allow an attacker to spoof email sender identities without being picked up by DMARC. Mailsploit also allows the bad guys to launch cross-site scripting (XSS) and code-injection attacks. According to Sabri Haddouche, the bombshell issue is that […]

1 14 15 16 17 18 157