21.2 C
London
Wednesday, April 8, 2020
Security researchers taking a closer look at the Philips Hue smart bulbs and the bridge device that connects them discovered a vulnerability that helped them compromise more meaningful systems on the local network. The security flaw was discovered is in the ZigBee wireless communication...
Researchers from exploited website exploitdb has reported then Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection. An attacker can exploit this issue to cause of authentication command injection. To fix this issue updates are available advice Schneider Electric Company.
Created in 2003, Centreon is an Open Source software package that lets you supervise all the infrastructures and applications comprising your information system. It was 50 000 users and 15 000 downloads per month. Around this project, there are two main actors : the Centreon...
Facebook patched a critical WhatsApp vulnerability that would have allowed potential attackers to read files from a user's local file system, on both macOS and Windows platforms. "A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file...
Facebook is one of the world's biggest advertising platforms, and that's because it knows a lot about you, me, and everyone. Facebook uses many tools to track people across the Internet, whether they have an account with the social networking site or not, and...
As cyber incidents increase in scope and impact, more and more organizations come to realize that outsourcing their defenses is the best practice—significantly increasing the Managed Security Service Provider (MSSP) market opportunities. Until recently, IT integrators, VARs, and MSPs haven't participated in the growing and profitable MSSP market...
The Indonesian National Police in a joint press conference with Interpol and cybersecurity firm Group-IB earlier today announced the arrest of three Magecart-style Indonesian hackers who had compromised hundreds of international e-commerce websites and stolen payment card details of their online shoppers. Dubbed 'Operation Night Fury,' the investigation...
Aleksei Burkov, a 29-year-old Russian hacker, on Thursday pleaded guilty to multiple criminal charges for running two illegal websites that helped cyber criminals commit more than $20 million in credit card fraud. The first website Burkov operated was an online marketplace for buying and selling stolen credit card...
Tails, the USB-borne operating system that aims to shield users from censorship and surveillance, has addressed a critical vulnerability in the Tor Browser that comes bundled with the software. Issued yesterday (January 14), Tails 4.2.2 is an emergency release that was necessitated by the...
Organizations in the private sector received an alert from the F.B.I. about operators of the Maze ransomware focusing on companies in the U.S. to encrypt information on their systems after stealing it first. The warning came less than a week after the Bureau warned...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it