Thursday, December 5, 2019

Tag: hackers

Vulnerability Allows ABB Substation Security System Control Hackers

Many ABB Relion defense systems can use a critical vulnerability to take or render a system inoperative, cautioned the DHS Cybersecurity and Infrastructure Security...

Hackers Accessed T-Mobile Prepaid Customer Information

This week, T-Mobile told a number of prepaid customers that their personal information might have been compromised by a hacker attack. Recently, the company found...

List for Hackers and Security Professionals Most Important Cyber Threat Intelligence...

Threat Intelligence Tools are used by security companies more often to test network and software for vulnerabilities. It helps collect and analyze data on current...

10 Best Friendly Search Engines for Hackers

Users can find any material on the worldwide web through the search engines. It helps to easily find information and is a web-based tool...

Hackers can Target Malicious Image Files to Able2Extract Users

Serious vulnerabilities in the Able2Extract Professional tool of Investintech may be exploited by hackers, which allow them to use specially crafted image files to...

22 Million hits Web.com, Register.com, Network Solutions Account Data Breach.

Network Solutions and Register.com, which are some of the world's biggest domain registrars, have recently reported a data infringement that may have contributed to...

Five More Hackers Become Millionaires on HackerOne

HackerOne claims that after reporting security vulnerabilities via the vulnerability coordination and bug bounty platform, five more hackers have become millionaires. Santiago Lopez, 19, known...

Hackers steal GateHub cryptocurrency wallets for $9.5 million

Unofficial investigation puts the number of victims between 80 and 90 users. Unknown how hackers stole money from users. Hackers have stolen from users of...

macOS Zero-Day Vulnerability Allows hackers with synthetic clicks to bypass protection

A new zero-day vulnerability in macOS allows hackers to bypass system safety warnings and compromise Synthetic Click easily. Patrick Wardle, security researcher, revealed the...

Hackers abuse Microsoft Azure to use malware and evasion technology on...

Now, Microsoft Azure is a sweet spot for hackers to host powerful malware and also to send and receive a command to affected systems...