Blog Posts Tagged with "exploit"


The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)


MS08_068 + MS10_046 = FUN UNTIL 2018

March 06, 2012 Added by:Rob Fuller

If you are on an internal penetration test and either exploit a machine or find an open share, you can create an LNK file with an icon that points at a nonexistent share on your attacking machine's IP...

Comments  (0)


Prevent VoIP Toll Fraud with Proper Configurations

February 22, 2012 Added by:Enno Rey

Unfortunately the attacker was able to circumvent our first workaround. We discovered that it was possible to “dial-in” to the router directly by calling the head number. As a long-term solution the configured dial patterns have to be modified to prevent such things in the future...

Comments  (0)


Hacker Boasts of Intel Corporation Network Breach

February 13, 2012 Added by:Headlines

A hacker who goes by the handles "WeedGrower" and "X-pOSed" claims to have breached tech giant Intel and to have gained access to an subscriber database that contains sensitive information including passwords, social security and credit card numbers...

Comments  (0)


MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)


Stuxnet: Are We Safe Now? Of Course Not...

January 31, 2012 Added by:Pierluigi Paganini

We are fighting with an invisible enemy. We are under attack, and we have no idea of the potentiality of agents that theatrically could remain in stealth mode inside the target, avoiding security systems for several years, gathering information and preparing the final attack...

Comments  (0)


Lilupophilupop SQLi Attack: One Million URLs Infected

January 05, 2012 Added by:Headlines

"When I first came upon the attack there were about 80 pages infected according to Google searches. Today, well as the title suggests we top a million, about 1,070,000 in fact - there will be duplicate URLs that show up in the searches. Still working on a discrete domain list for this..."

Comments  (1)


Chinese Cyber Espionage Targeting Drone Technology

January 04, 2012 Added by:Headlines

"This campaign could target organizations related to technology used in... aerospace and military industries... With the information we collected it appears that this campaign has been running for months. Someone has said that cyberwar does not exist?. Draw your own conclusions..."

Comments  (0)


Printer Hack: Researchers Can Set Media’s Pants on Fire

December 07, 2011 Added by:Brian Smithson

What was most irresponsible in this case was that the researchers took their exploit of one model of printer from one manufacturer and without even a cursory investigation extrapolated the threat to “hundreds of millions” of printers and fed it to a media hungry for sensational headlines...

Comments  (0)


Millions of Printers Vulnerable to Hacking Attacks

November 29, 2011 Added by:Headlines

“How many of those printers are out there?’ It could be much more than 100 million... It may ultimately lead to telling everyone they just have to throw their printers out and start over. Fixing this is going to require a very coordinated effort by the industry..."

Comments  (0)


Gleg releases Ver 1.7 of the SCADA+ Exploit Pack

October 24, 2011 Added by:Joel Langill

On October 20, Gleg released version 1.7 of the SCADA+ Exploit Pack for the Immunity Canvas framework, though this time around, I do not see a lot of unique value in the code updates. Modules of interest in this release represent the bulk of the ICS/SCADA vulnerabilities disclosed in September...

Comments  (0)

Page « < 1 - 2 > »