■■□□□ https://www.zdnet.com/google-amp/article/most-cyber-security-reports-only-focus-on-the-cool-threats/ https://t.me/cKure/5481
All posts tagged Cyber Security
September 8, 2020 at 09:47PM
■■■■□ HashCat added support to crack password-protected RAR 3 archives without header encryption (both compressed and uncompressed). https://github.com/hashcat/hashcat/pull/2542 https://t.me/cKure/5480
September 8, 2020 at 06:33PM
■■□□□ #DataLeak via security companies and interesting data to form a wordlist. #privacy https://www.infosecurity-magazine.com:443/news/cybersecurity-firm#DataLeak via security companies and interesting data to form a wordlist. #privacy https://www.infosecurity-magazine.com:443/news/cybersecurity-firms-expose/ https://t.me/cKure/5479
September 8, 2020 at 06:16PM
■■□□□ Account Takeover: Game ; CoD user accounts being hacked. Activision (owner company) scrambling but failing to support. Hackers demand 100 USD from users. https://t.me/cKure/5478
September 8, 2020 at 03:43PM
■■■■□ After France, Japan, New Zealand warn of sudden spike in Emotet attacks. https://t.me/cKure/5477
September 8, 2020 at 03:30PM
■□□□□ UK research university Newcastle University suffered a DoppelPaymer ransomware attack and took its systems offline in response to the attack. https://t.me/cKure/5476
September 8, 2020 at 03:10PM
■■■■□ Video PoC of visa, mastercard, europay fraud / PIN verification bypass for NFC / contactless payments. https://thehackernews.com/2020/09/emv-payment-card-pin-hacking.html https://t.me/cKure/5475
September 8, 2020 at 03:04PM
■■■■□ XSS in Google Maps. Fix was bypassed by researched again and thereby paid double. https://www.zdnet.com/article/researcher-reveals-google-maps-xss-bug-patch-bypass/#ftag=RSSbaffb68 https://t.me/cKure/5474
September 8, 2020 at 09:10AM
■■■□□ #Australia : New South Wales government staff emails (47 accounts) compromised by #Australia : New South Wales government staff emails (47 accounts) compromised by attackers. https://t.me/cKure/5473
September 8, 2020 at 01:31AM
■■■■□ Windows 10 Sandbox activation enables zero-day vulnerability as an unprivileged user can create an arbitrary file in ‘system32'. Vulnerability resides in Storage VSP – Virtualization Service Provider / Hyper-V https://www.bleepingcomputer.com/news/security/windows-10-sandbox-activation-enables-zero-day-vulnerability/ https://t.me/cKure/5472