Blog Posts Tagged with "exploit"

69dafe8b58066478aea48f3d0f384820

The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

MS08_068 + MS10_046 = FUN UNTIL 2018

March 06, 2012 Added by:Rob Fuller

If you are on an internal penetration test and either exploit a machine or find an open share, you can create an LNK file with an icon that points at a nonexistent share on your attacking machine's IP...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

Prevent VoIP Toll Fraud with Proper Configurations

February 22, 2012 Added by:Enno Rey

Unfortunately the attacker was able to circumvent our first workaround. We discovered that it was possible to “dial-in” to the router directly by calling the head number. As a long-term solution the configured dial patterns have to be modified to prevent such things in the future...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Boasts of Intel Corporation Network Breach

February 13, 2012 Added by:Headlines

A hacker who goes by the handles "WeedGrower" and "X-pOSed" claims to have breached tech giant Intel and to have gained access to an Intel.com subscriber database that contains sensitive information including passwords, social security and credit card numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Stuxnet: Are We Safe Now? Of Course Not...

January 31, 2012 Added by:Pierluigi Paganini

We are fighting with an invisible enemy. We are under attack, and we have no idea of the potentiality of agents that theatrically could remain in stealth mode inside the target, avoiding security systems for several years, gathering information and preparing the final attack...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lilupophilupop SQLi Attack: One Million URLs Infected

January 05, 2012 Added by:Headlines

"When I first came upon the attack there were about 80 pages infected according to Google searches. Today, well as the title suggests we top a million, about 1,070,000 in fact - there will be duplicate URLs that show up in the searches. Still working on a discrete domain list for this..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Espionage Targeting Drone Technology

January 04, 2012 Added by:Headlines

"This campaign could target organizations related to technology used in... aerospace and military industries... With the information we collected it appears that this campaign has been running for months. Someone has said that cyberwar does not exist?. Draw your own conclusions..."

Comments  (0)

7ca9cf570bb97d22b119f3a70d335ede

Printer Hack: Researchers Can Set Media’s Pants on Fire

December 07, 2011 Added by:Brian Smithson

What was most irresponsible in this case was that the researchers took their exploit of one model of printer from one manufacturer and without even a cursory investigation extrapolated the threat to “hundreds of millions” of printers and fed it to a media hungry for sensational headlines...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Millions of Printers Vulnerable to Hacking Attacks

November 29, 2011 Added by:Headlines

“How many of those printers are out there?’ It could be much more than 100 million... It may ultimately lead to telling everyone they just have to throw their printers out and start over. Fixing this is going to require a very coordinated effort by the industry..."

Comments  (0)

7b072d611db66025d89ff3137dcddfb3

Gleg releases Ver 1.7 of the SCADA+ Exploit Pack

October 24, 2011 Added by:Joel Langill

On October 20, Gleg released version 1.7 of the SCADA+ Exploit Pack for the Immunity Canvas framework, though this time around, I do not see a lot of unique value in the code updates. Modules of interest in this release represent the bulk of the ICS/SCADA vulnerabilities disclosed in September...

Comments  (0)

Page « < 1 - 2 > »