science and technology US Army Website Defaced By Syrian Electronic Army By packetstormsecurity.com Published On :: Tue, 09 Jun 2015 13:30:43 GMT Full Article headline hacker government usa cyberwar syria
science and technology Russian Plane Crash Possibly Fault Of ISIS Bomb By packetstormsecurity.com Published On :: Thu, 05 Nov 2015 00:55:41 GMT Full Article headline russia terror syria
science and technology Syrian Electronic Army Hacker Suspects Charged By packetstormsecurity.com Published On :: Wed, 23 Mar 2016 13:59:59 GMT Full Article headline hacker government usa fbi syria
science and technology Guilty Plea For Syrian Electronic Army Accomplice By packetstormsecurity.com Published On :: Fri, 30 Sep 2016 14:28:46 GMT Full Article headline hacker malware cybercrime fraud germany syria
science and technology European Surveillance Companies Were Eager To Sell Syria Tools Of Oppression By packetstormsecurity.com Published On :: Mon, 12 Dec 2016 17:14:20 GMT Full Article headline government privacy cyberwar spyware syria
science and technology The US Shot Down A Mysterious Enemy Drone Over Syria By packetstormsecurity.com Published On :: Mon, 12 Jun 2017 14:23:08 GMT Full Article headline usa cyberwar syria
science and technology Surgeon Thinks Hack Led To Syrian Air Strike By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 14:00:06 GMT Full Article headline hacker cyberwar syria
science and technology These Hackers Are Using Android Surveillance Malware To Target Opponents Of The Syrian Government By packetstormsecurity.com Published On :: Mon, 10 Dec 2018 15:03:12 GMT Full Article headline hacker government malware fraud spyware syria
science and technology OVP Website Falls To Multiple Hacker Attacks In 1 Day By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 14:31:57 GMT Full Article headline hacker government philippines
science and technology Patriotic Hackers Face Off In South China Sea By packetstormsecurity.com Published On :: Fri, 27 Apr 2012 14:46:33 GMT Full Article headline china cyberwar philippines
science and technology Philippine Police Arrest 357 In Cyber Crime Raid By packetstormsecurity.com Published On :: Sun, 26 Aug 2012 05:44:59 GMT Full Article headline hacker government cybercrime fraud philippines
science and technology Anonymous Becomes Peacemaker As Hacktivists Battle By packetstormsecurity.com Published On :: Tue, 05 Mar 2013 06:52:36 GMT Full Article headline anonymous malaysia philippines
science and technology Anonymous Posts Filipino President's Phone Numbers By packetstormsecurity.com Published On :: Mon, 17 Jun 2013 15:15:48 GMT Full Article headline hacker government data loss anonymous philippines
science and technology 55 Million Voters' Details Leaked In The Philippines By packetstormsecurity.com Published On :: Thu, 07 Apr 2016 14:01:52 GMT Full Article headline hacker government privacy data loss philippines
science and technology Philippines Elections Hack 'Leaks Voter Data' By packetstormsecurity.com Published On :: Tue, 12 Apr 2016 00:24:50 GMT Full Article headline hacker data loss philippines
science and technology Russian Hacker Group Patches Chrome And Firefox To Fingerprint TLS Traffic By packetstormsecurity.com Published On :: Fri, 04 Oct 2019 13:47:44 GMT Full Article headline hacker privacy malware russia cyberwar google mozilla cryptography
science and technology Mozilla's Firefox 70 Is Out: Privacy Reports Reveal Whose Cookies Are Tracking You By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 18:24:33 GMT Full Article headline privacy spyware mozilla
science and technology GNU Privacy Guard 2.2.14 By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 21:10:07 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology GNU Privacy Guard 2.2.15 By packetstormsecurity.com Published On :: Tue, 26 Mar 2019 15:17:20 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology Stegano 0.9.2 By packetstormsecurity.com Published On :: Thu, 04 Apr 2019 23:48:57 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
science and technology Stegano 0.9.3 By packetstormsecurity.com Published On :: Wed, 10 Apr 2019 15:18:03 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
science and technology OpenSSH 8.0p1 By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:17:35 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
science and technology OpenSSL Toolkit 1.1.1c By packetstormsecurity.com Published On :: Tue, 28 May 2019 16:38:40 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
science and technology GNU Privacy Guard 2.2.16 By packetstormsecurity.com Published On :: Tue, 28 May 2019 16:43:38 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology Stegano 0.9.4 By packetstormsecurity.com Published On :: Wed, 05 Jun 2019 23:02:22 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
science and technology Hyperion Runtime Encrypter 2.0 By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:41:35 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
science and technology GNU Privacy Guard 2.2.17 By packetstormsecurity.com Published On :: Sat, 13 Jul 2019 03:33:33 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology Tinc Virtual Private Network Daemon 1.0.36 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:04:57 GMT tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information. Full Article
science and technology SSLsplit 0.5.5 By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 16:01:23 GMT SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing. Full Article
science and technology OpenSSL Toolkit 1.1.1d By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 14:06:41 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
science and technology OpenSSH 8.1p1 By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:12:55 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
science and technology cryptmount Filesystem Manager 5.3.2 By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:37:05 GMT cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up. Full Article
science and technology GNU Privacy Guard 2.2.18 By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:37:46 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology GNU Privacy Guard 2.2.19 By packetstormsecurity.com Published On :: Mon, 09 Dec 2019 16:08:45 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology OpenSSH 8.2p1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:55:36 GMT This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. Full Article
science and technology OpenSSL Toolkit 1.1.1e By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:23:24 GMT OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. Full Article
science and technology GNU Privacy Guard 2.2.20 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 15:59:41 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
science and technology Hyperion Runtime Encrypter 2.3 By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 20:32:22 GMT Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter". Full Article
science and technology Hashes Generation And Injection Tool By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 03:07:26 GMT Hashes is a cross-platform tool that generates and injects different keys with the same hash code in order to test web applications against hash collision attacks. Written in Java. Has support for Java, PHP, ASP, and V8. Full Article
science and technology Secunia Security Advisory 50313 By packetstormsecurity.com Published On :: Wed, 22 Aug 2012 06:23:11 GMT Secunia Security Advisory - A vulnerability has been reported in CuteSoft Cute Editor for ASP.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Article
science and technology ASP-DEv XM Forums RC 3 SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Aug 2012 11:11:11 GMT ASP-DEv XM Forums RC 3 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data. Full Article
science and technology Avaya IP Office Customer Call Reporter Command Execution By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 23:54:22 GMT This Metasploit module exploits an authentication bypass vulnerability on Avaya IP Office Customer Call Reporter, which allows a remote user to upload arbitrary files through the ImageUpload.ashx component. It can be abused to upload and execute arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2. Full Article
science and technology FCKEditor 2.6.8 ASP File Upload Protection Bypass By packetstormsecurity.com Published On :: Wed, 28 Nov 2012 01:33:11 GMT FCKEditor version 2.6.8 ASP version suffers from a file upload protection bypass. Full Article
science and technology Kaseya uploadImage Arbitrary File Upload By packetstormsecurity.com Published On :: Wed, 04 Dec 2013 03:10:57 GMT This Metasploit module exploits an arbitrary file upload vulnerability found in Kaseya versions below 6.3.0.2. A malicious user can upload an ASP file to an arbitrary directory without previous authentication, leading to arbitrary code execution with IUSR privileges. Full Article
science and technology ASP-Nuke 2.0.7 Open Redirect By packetstormsecurity.com Published On :: Fri, 28 Mar 2014 11:11:11 GMT ASP-Nuke version 2.0.7 suffers from an open redirect vulnerability. Full Article
science and technology DevExpress ASP.NET File Manager 13.2.8 Directory Traversal By packetstormsecurity.com Published On :: Thu, 05 Jun 2014 20:59:44 GMT DevExpress ASP.NET File Manager versions 10.2 through 13.2.8 suffer from a directory traversal vulnerability. Full Article
science and technology Cogent DataHub Command Injection By packetstormsecurity.com Published On :: Wed, 25 Jun 2014 00:06:40 GMT This Metasploit module exploits an injection vulnerability in Cogent DataHub prior to 7.3.5. The vulnerability exists in the GetPermissions.asp page, which makes insecure use of the datahub_command function with user controlled data, allowing execution of arbitrary datahub commands and scripts. This Metasploit module has been tested successfully with Cogent DataHub 7.3.4 on Windows 7 SP1. Full Article
science and technology Hacking ASP/ASPX Websites Manually By packetstormsecurity.com Published On :: Mon, 30 Jun 2014 09:22:22 GMT This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually. Full Article
science and technology Telerik ASP.NET AJAX RadEditor Control 2014.1.403.35 XSS By packetstormsecurity.com Published On :: Thu, 25 Sep 2014 15:20:36 GMT Telerik ASP.NET AJAX RadEditor Control versions 2014.1.403.35 and 2009.3.1208.20 suffer from a persistent cross site scripting vulnerability. Full Article
science and technology Numara / BMC Track-It! FileStorageService Arbitrary File Upload By packetstormsecurity.com Published On :: Tue, 21 Oct 2014 02:43:59 GMT This Metasploit module exploits an arbitrary file upload vulnerability in Numara / BMC Track-It! v8 to v11.X. The application exposes the FileStorageService .NET remoting service on port 9010 (9004 for version 8) which accepts unauthenticated uploads. This can be abused by a malicious user to upload a ASP or ASPX file to the web root leading to arbitrary code execution as NETWORK SERVICE or SYSTEM. This Metasploit module has been tested successfully on versions 11.3.0.355, 10.0.51.135, 10.0.50.107, 10.0.0.143, 9.0.30.248 and 8.0.2.51. Full Article