HackDig : Dig high-quality web security articles for hackers

Critical SAP Recon vulnerability exposes thousands of system to full take over

IT giant SAP addressed a critical flaw, tracked as  CVE-2020-6287 and dubbed RECON, that could allow attackers to take over corporate servers. SAP has released security patches to address a critical vulnerability, tracked as CVE-2020-6287 and dubbed RECON (Remotely Exploitable Code On NetWeaver), that could be exploited by attackers to take over corporate
Publish At:2020-07-14 06:39 | Read:33 | Comments:0 | Tags:Breaking News Hacking RECON Vulnerability

New Mirai variant includes exploit for a flaw in Comtrend Routers

Researchers spotted a new version of the Mirai IoT botnet that includes an exploit for a vulnerability affecting Comtrend routers. Malware researchers at Trend Micro have discovered a new version of the Mirai Internet of Things (IoT) botnet that includes an exploit for the CVE-2020-10173 vulnerability impacting Comtrend routers. The Mirai botnet was fi
Publish At:2020-07-14 06:11 | Read:113 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

Trump admits to have authorized a cyber attack on Russian troll farm in 2018

U.S. President Donald Trump has revealed that in 2018 US have launched a cyberattack against a Russian company suspect to be a Russian troll farm. U.S. President Donald Trump has confirmed that in 2018 US cyber army has launched a cyber-attack against a Russian company believed to be a troll farm behind some major disinformation campaigns, including the
Publish At:2020-07-13 14:25 | Read:69 | Comments:0 | Tags:Breaking News Cyber warfare disinformation Hacking hacking n

Malware campaign attempts to evade analysis with Any.Run sandbox

Malware authors are implementing the capability to check if their malicious code is running in the Any.Run malware analysis service. Vxers are implementing the capability to check if their malware is running in the Any.Run interactive online malware sandbox to prevent them from being analyzed by experts. Every time malware is uploaded to the platform,
Publish At:2020-07-13 10:52 | Read:65 | Comments:0 | Tags:Breaking News Cyber Crime Malware Any.Run Hacking hacking ne

Personal details and SSNs of 40,000 US citizens available for sale

Security experts at threat intelligence firm Cyble have identified a credible actor selling personal details of approximately 40,000 US citizens. Security experts at threat intelligence firm Cyble Experts have discovered the availability on the darkweb of personal details of approximately 40,000 US citizens along with their social security numbers (SSNs).
Publish At:2020-07-13 10:52 | Read:93 | Comments:0 | Tags:Breaking News Hacking Malware

Hacker claims to have breached Night Lion security firm

Hacker claims to have stolen more than 8,200 databases from the US cyber security firm Night Lion Security. Hacker claims to have stolen more than 8,200 databases from the US cyber security firm Night Lion Security. The hacker is using the moniker “NightLion,” which is the name of the hacked company. The databases are the back-end behind th
Publish At:2020-07-13 05:55 | Read:106 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking hacking news i

Records of 45 million+ travelers to Thailand and Malaysia surfaced in the darkweb

Experts from Cyble discovered the availability on the darkweb of records of over 45 million travelers to Thailand and Malaysia from multiple countries. Experts from threat intelligence firm have discovered the availability on the darkweb of records of over 45 million travelers to Thailand and Malaysia from multiple countries. Records of 45 Million+ tr
Publish At:2020-07-13 03:37 | Read:118 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web Hacking infor

Google updates policies to ban any ads for surveillance solutions and services

Google announced that starting from August it will update its policies to reject ads proposed by organizations offering surveillance software. Google announced the update of its Google Ads Enabling Dishonest Behavior policy to “prohibit the promotion of products or services that are marketed or targeted with the express purpose of tracking or monitoring a
Publish At:2020-07-12 03:59 | Read:172 | Comments:0 | Tags:Breaking News Security ads Google Hacking hacking news infor

Security Affairs newsletter Round 272

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. CISA warns organizations of cyberattacks from the Tor networkCisco Talos discloses technicals details of Chrome, Firefox flawsHuawei faces 5G ban from Britishs 5G network within monthsFormer Yahoo! emplo
Publish At:2020-07-12 03:59 | Read:151 | Comments:0 | Tags:Breaking News Newsletter

Yevgeniy Nikulin, Russian hacker behind Dropbox and LinkedIn hacks found guilty

The Russian hacker Yevgeniy Nikulin found guilty for LinkedIn, Dropbox, and Formspring data breach back in 2012 and the sale of their users’ data. A jury found Russian hacker Yevgeniy Nikulin guilty for the hack of LinkedIn, Dropbox, and Formspring back in 2012 and for the sale of the stolen data on cybercrime black marketplaces. The Russian crim
Publish At:2020-07-11 14:15 | Read:222 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime data breach Dro

Evilnum Group targets European and British fintech companies

A threat actor tracked as Evilnum targeted financial technology companies, mainly the British and European ones, ESET researchers reported. Evilnum threat actor was first spotted in 2018 while using the homonym malware. Over the years, the group added new tools to its arsenal, including custom and homemade malware along with software purchased from the Go
Publish At:2020-07-11 00:58 | Read:175 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware APT Evilnum hackin

Hackers are scanning the web for vulnerable Citrix systems

Threat actors are scanning the Internet for Citrix systems affected by the recently disclosed vulnerabilities. This week Citrix has addressed 11 vulnerabilities affecting the ADC, Gateway, and SD-WAN WANOP networking products. The vulnerabilities could be exploited by attackers for local privilege escalation, to trigger a DoS condition, to bypass authoriz
Publish At:2020-07-11 00:58 | Read:150 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

Juniper Networks addressed many issues in its products

Juniper Networks addressed several vulnerabilities in its firewalls, most of them can be exploited by attackers for denial-of-service (DoS) attacks. Juniper Networks addressed several vulnerabilities in its products, most of them can be exploited by attackers for denial-of-service (DoS) attacks. Half a dozen of the flaws are DoS issues that have been rate
Publish At:2020-07-10 17:15 | Read:201 | Comments:0 | Tags:Breaking News Hacking DOS hacking news information security

KingComposer fixes a reflected XSS impacting 100,000 WordPress sites

An XSS vulnerability in the KingComposer page builder for WordPress impacts 100,000 websites using the WordPress plugin.  Researchers at Wordfence Threat Intelligence team discovered a reflected cross-site scripting (XSS) vulnerability, tracked as CVE-2020-15299, in the KingComposer WordPress plugin that potentially impacts 100,000 websites.  KingCompo
Publish At:2020-07-10 09:25 | Read:156 | Comments:0 | Tags:Breaking News Hacking Security information security news IT

Researchers found allegedly intentional backdoors in FTTH devices from Chinese vendor C-Data

Two security researchers have found undocumented Telnet admin account accounts in 29 FTTH devices from Chinese vendor C-Data. Two security researchers have discovered undocumented Telnet admin account accounts in 29 Fiber-To-The-Home (FTTH) devices from Chinese vendor C-Data. The CDATA OLTs are sold under different brands, including Cdata, OptiLink, V-
Publish At:2020-07-10 09:25 | Read:166 | Comments:0 | Tags:Breaking News Hacking CDATA DOS hacking news information sec

Announce

Share high-quality web security related articles with you:)

Tools

Keywords