Saturday, September 22, 2018
Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

$60 Million Worth Cryptocurrencies Stolen From Zaif Exchange

Hackers stolen cryptocurrencies worth $60 million form Japanese cryptocurrency exchange firm Zaif exchange hot wallet that connected to the internet. The stolen cryptocurrencies include Bitcoin, Monacoin and Bitcoin Cash, the attackers...

ZDI opened Microsoft Zero-day Flaw in Public-120 Days Deadline Crossed

A Microsoft Zero-day vulnerability that existing in Microsoft JET Database Engine has been crossed zero-day Initiative (ZDI) 120 days disclosure deadline and now it released in public. ZDI initially reported this...

Announcing McAfee’s Evolved Consumer Product Portfolio

Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer...

3000 Hacked Websites Access comes to Sale in Dark Web Marketplace

Cybercriminals listed 3000 Hacked websites access for sale in Russian based underground marketplace that sells for less than $50. The underground marketplace is the best area for criminals where they can...

Hackers Uploaded Fake Apps into Google Play Store

Hackers uploaded finance based fake apps into the Google play store to steal credit card details and login credentials to the targeted bank or service. The malicious apps found to...

Adobe Security Updates for Acrobat and Acrobat Reader

Adobe security updates that address multiple  critical  vulnerabilities with Acrobat and Acrobat Reader for Windows and MacOS, successful exploitation of this vulnerability lead to an arbitrary code execution in the...

Ubuntu Released Security Updates & Fixed Multiple Critical Vulnerabilities

Ubuntu Released security updates frequently this month and fixed multiple critical vulnerabilities that affected the Ubuntu package. The vulnerabilities are fixed with the latest packages if you have enabled automatic update in...

Hackers Injecting Crypto-mining Malware into Legitimate PDF Software

Cybercriminals using a new type of attack called Evil clone to inject Cryptocurrency malware into legitimate PDF software to Mine cryptocurrency with the help of CoinHive miner. Cryptocurrency malware is dramatically...

The Top 3 Reasons to Integrate DLP with a Cloud Access Security Broker (CASB)

Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications.  This...

Mirai Botnet Authors Avoid Jail Time — Krebs on Security

Citing “extraordinary cooperation” with the government, a court in Alaska on Tuesday sentenced three men to probation, community service and fines for their admitted roles in authoring and...

APLICATIONS

Dream team ESET XI to take on the might of malware

An all-star line-up to go head-to-head with malware The day has finally arrived! The 21st edition of the FIFA World Cup is about to...

HOT NEWS