security

  1. Brother

    Security of 150,000 WordPress sites under question due to vulnerabilities in a popular plugin

    Authorization bypassing and cross-site scripting compromise data privacy. Two serious vulnerabilities were discovered in the popular POST SMTP plugin for WordPress, which is used on more than 300,000 websites. These flaws can allow attackers to gain full control over the target site...
  2. Brother

    Insurance company Fidelity admitted that profit is more important than customer data security

    The company explained why it is not afraid for its finances after a cyberattack. Fidelity National Financial( FNF), one of the largest providers of real estate insurance and mortgage operations in the United States, was the victim of a cyber attack. In November last year, hackers penetrated the...
  3. Brother

    Menorah attacks the Middle East: how a common virus rewrites security rules for an entire region

    The complexity and uniqueness of the malware requires new approaches to data protection. Cybersecurity experts from SecurityScorecard have identified a new variation of a computer virus called Menorah that targets organizations in the Middle East. It was first discovered and analyzed by Trend...
  4. Brother

    Software security starts with the developer: GitHub introduces mandatory two-factor authentication

    Users run the risk of losing access to the code if they ignore the requirement. GitHub announced that from January 19, 2024, users working with code on the site will be required to activate two-factor authentication (2FA). This is reported in emails sent to users on Christmas Eve. The company...
  5. Brother

    Windows 10 and 11 update forced users to choose between stable Wi-Fi and security

    What can be the reason for internet connection failures? Recently, users of the Windows 10 and 11 operating systems have been experiencing serious problems with Wi-Fi. The root of the problem appears to be a security update released by Microsoft on December 12 under the number KB5033375. This...
  6. BitBrowser

    🔥🔥🔥 Anti-detection browser! 10 free configurations, RPA, and group control systems are all available! 🔥🔥🔥

    Just like everyone has a unique fingerprint, our devices also have their own unique digital fingerprint. A digital fingerprint refers to a set of parameters that can be used to identify a unique user. The data used to create this fingerprint includes IP address, operating system...
  7. Brother

    Illusion of security: hackers learned how to simulate the lock mode in iOS

    Do you think your iPhone is protected? Don't blindly believe what you see. Experts from Jamf Threat Labs warned of a new threat to iPhone users associated with the use of "post-operational intervention techniques". This method allows attackers to visually deceive the user, making him believe...
  8. Brother

    Beautiful picture or security? With the LogoFAIL vulnerability, hackers will inject a bootkit into your UEFI without too much noise

    Global threat: hundreds of models of computers and laptops are at risk. Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
  9. Brother

    Just three vulnerabilities in ownCloud hurt user security

    The developers gave recommendations for mitigating the consequences, so you should not delay them. Developers of the ownCloud open source software used for syncing data and working together with files, warned on November 21 about three critical vulnerabilities that can be used to disclose...
  10. Lord777

    Total control for the sake of security: the new norm in UK politics?

    The new bill threatens end-to-end encryption and data security. The UK government has initiated a bill that will oblige technology companies to provide information about planned innovations in the field of security of their products and, if necessary, even disable them on demand. These...
  11. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
  12. Carding 4 Carders

    StripedFly: how the malware deceived information security specialists and affected millions of victims

    A universal program in the cryptominer mask allows you to conduct cyber attacks of any type. Kaspersky Lab specialists have identified a complex malware campaign called StripedFly, previously unknown and extremely confusing. Since 2017, the operation has affected more than one million users...
  13. Carding 4 Carders

    Who will win the fight for your privacy: banks or security forces?

    The new bill raises many questions and debates. Russian banks have expressed their opposition to the bill proposing to provide law enforcement agencies with direct access to information systems and databases with customer information, the Association of Banks of Russia (ADB) reports in a letter...
  14. CarderPlanet

    iPhone security on the verge: a new 0day vulnerability caused massive attacks on users

    Apple urgently fixes a bug that allows you to take control of the device. Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...
  15. Carding

    Why are we being deceived? The unsightly side of security guides.

    Find out the truth behind the security guidelines. The cybersecurity instructions you receive at work may cause confusion? You are not alone. According to a recent study, there are a number of problems in the wording of these guidelines. The authors suggest simple measures to improve the...
  16. Carding

    Attack on the Paraguayan Police: stavka – the future of the country's security

    Data leaks can affect national security and international relations. More than 500,000 internal documents and images, as well as 175 GB of SQL databases, were stolen from the system of the National Police of Paraguay (Policía Nacional del Paraguay). Among the leaked data are documents from...
  17. Carding

    How ASUS disappointed its fans: three unacceptable mistakes in router security

    Update your firmware or your data is in trouble. Three critical remote code execution vulnerabilities were found in popular ASUS router models: RT-AX55, RT-AX56U_V2, and RT-AC86U. The defects will allow potential attackers to gain full control over devices if the user does not install the...
  18. Hacker

    Total FAQ on Network Security and Anonymity

    1. Complete anonymity does not exist in nature at all! "Complete anonymity" is not required, it is enough to confuse the chain in such a way that its unraveling is unprofitable and the effort spent does not pay off with the result. To reach this level, you do not need any special knowledge and...
  19. CarderPlanet

    Security and Privacy Apps for your Android!

    Good day! Today we have selected apps for you that will greatly enhance your security and privacy when using Android devices. In addition to protecting your personal data, applications will allow you to replace some of the Google services that most aggressively collect user information. Let's...
  20. BigBeast

    HOW TO DETECT SSH HONEYPOTS ?

    What are SSH honeypots? Honeypots are decoy servers or systems set up to gather information regarding an attacker or intruder into a system. They are designed to look vulnerable to attack, but once an intruder gains access to the system all of their actions are controlled and monitored. SSH...
Top