ed Millions Of Facebook User Phone Numbers Exposed Online, Researchers Say By packetstormsecurity.com Published On :: Thu, 19 Dec 2019 17:23:52 GMT Full Article headline privacy phone data loss flaw facebook social
ed Facebook's Sir Nick Clegg Criticized Over WhatsApp Security By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 16:52:25 GMT Full Article headline hacker privacy flaw facebook cryptography
ed Facebook's New Privacy Tool Lets You Manage How You're Tracked By packetstormsecurity.com Published On :: Tue, 28 Jan 2020 15:39:48 GMT Full Article headline privacy facebook social
ed Flaws In WhatsApp's Desktop App Allowed Remote Access To Files By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:28 GMT Full Article headline privacy data loss flaw facebook
ed Facebook Sued By Australian Information Watchdog Over Cambridge Analytica-Linked Data Breach By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 15:01:39 GMT Full Article headline government privacy australia data loss facebook
ed Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) Null Free Shellcode By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:58:06 GMT 47 bytes small Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) null free shellcode. Full Article
ed Linux Password Protected Bindshell Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:33:25 GMT 272 bytes small Linux/x86_64 null free password protected bindshell shellcode. Full Article
ed Linux/x64_86 ROL Encoded Execve Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:44:44 GMT 57 bytes small Linux/x64_86 /bin/bash shellcode. The stub decodes the ROL Encoded shellcode. When the stub has finished decoding the payload, execution control is passed to the payload. Full Article
ed Indian Spooks Snooping Without ISP Knowledge By packetstormsecurity.com Published On :: Mon, 09 Sep 2013 15:11:50 GMT Full Article headline government privacy india spyware
ed Virgin Media Learns About Poor Outsourcing Decisions By packetstormsecurity.com Published On :: Fri, 04 Mar 2016 16:02:25 GMT Full Article headline india flaw cryptography
ed All Phones In India To Be Equipped With Panic Buttons From 2017 By packetstormsecurity.com Published On :: Wed, 27 Apr 2016 14:37:59 GMT Full Article headline phone india
ed Bogus MDM System Used To Hack iPhones In India By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 15:57:49 GMT Full Article headline malware phone india fraud apple
ed 24 People Sentenced In India-Based Phone-Scam Case By packetstormsecurity.com Published On :: Tue, 24 Jul 2018 15:50:57 GMT Full Article headline phone india fraud
ed Data Of Nearly 700,000 Amex India Customers Exposed Via Unsecured MongoDB Server By packetstormsecurity.com Published On :: Wed, 07 Nov 2018 16:32:01 GMT Full Article headline privacy bank india cybercrime data loss fraud
ed Location Data For Over 11,000 Indian Buses Left Exposed Online By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 15:58:00 GMT Full Article headline india data loss spyware
ed New North Korean Malware Targeting ATMs Spotted In India By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:52:35 GMT Full Article headline bank india cybercrime fraud cyberwar korea
ed Google Patches Dangerous MediaTek Flaw For Tons Of Phones By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 14:01:21 GMT Full Article headline phone flaw google patch
ed Google Launches Coronavirus Website In The United States By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 16:11:13 GMT Full Article headline virus google
ed PHPKB Multi-Language 9 Authenticated Directory Traversal By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:56:01 GMT PHPKB Multi-Language 9 suffers from an authenticated directory traversal vulnerability. Full Article
ed QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
ed Booked Scheduler 2.7.7 Directory Traversal By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:37:26 GMT Booked Scheduler version 2.7.7 suffers from an authenticated directory traversal vulnerability. Full Article
ed Police In Romania Detain 20 Alleged Hackers By packetstormsecurity.com Published On :: Wed, 11 Mar 2009 17:03:38 GMT Full Article hacker government fraud romania
ed Alleged Romanian Phishers Finally Hauled Into US Courts By packetstormsecurity.com Published On :: Wed, 30 Sep 2009 17:28:45 GMT Full Article government usa phish romania
ed 50 Arrested In Smartphone Spyware Dragnet By packetstormsecurity.com Published On :: Thu, 01 Jul 2010 11:35:47 GMT Full Article phone spyware romania
ed Over 100 Fraudsters Arrested By US And Romanian Police By packetstormsecurity.com Published On :: Sat, 16 Jul 2011 16:14:14 GMT Full Article headline usa fraud romania
ed Romanian Cops Cuff Suspected Serial Hacker TinKode By packetstormsecurity.com Published On :: Wed, 01 Feb 2012 16:15:08 GMT Full Article headline hacker government usa romania
ed Romanians Plead Guilty To Credit Card Hack On US Subway Shops By packetstormsecurity.com Published On :: Tue, 18 Sep 2012 15:02:35 GMT Full Article headline bank cybercrime fraud romania
ed DNS Servers Filled With Wrong Kool-Aid In Romania By packetstormsecurity.com Published On :: Thu, 29 Nov 2012 07:22:09 GMT Full Article headline dns romania
ed Europol Smashes Romanian Credit Card Fraud Gang By packetstormsecurity.com Published On :: Fri, 29 Mar 2013 02:08:15 GMT Full Article headline cybercrime fraud romania
ed Celebrity Email Cracker Guccifer Gets Cuffed By packetstormsecurity.com Published On :: Thu, 23 Jan 2014 03:08:49 GMT Full Article headline hacker privacy email data loss romania
ed Notorious Hacker Guccifer Sentenced In Romania By packetstormsecurity.com Published On :: Tue, 10 Jun 2014 14:10:51 GMT Full Article headline hacker government usa romania
ed Guccifer Charged By US Over President Hacks By packetstormsecurity.com Published On :: Fri, 13 Jun 2014 13:29:15 GMT Full Article headline hacker government usa data loss romania
ed Romanian Man Extradited To U.S. To Face Hacking Charges By packetstormsecurity.com Published On :: Wed, 25 Mar 2015 13:47:48 GMT Full Article headline hacker government usa romania
ed US Says Romanians Hacked Washington DC Police Cameras By packetstormsecurity.com Published On :: Fri, 29 Dec 2017 14:08:11 GMT Full Article headline hacker government privacy usa cyberwar romania
ed Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ed Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ed Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ed Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
ed Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
ed Latest Java Zero-Day Linked To Bit9 Compromise By packetstormsecurity.com Published On :: Sat, 02 Mar 2013 23:25:27 GMT Full Article headline hacker flaw symantec java
ed Symantec Warns On Credit Card Security Phishing Scam By packetstormsecurity.com Published On :: Wed, 17 Apr 2013 14:55:05 GMT Full Article headline bank cybercrime scam symantec phish
ed French Bean-Counters Sweet Talked Into Trojans By packetstormsecurity.com Published On :: Tue, 14 May 2013 14:55:54 GMT Full Article headline malware bank trojan symantec
ed Symantec Creates Cloud To Battle Targeted Attacks By packetstormsecurity.com Published On :: Wed, 30 Oct 2013 15:12:32 GMT Full Article headline cybercrime fraud cyberwar symantec phish
ed Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer By packetstormsecurity.com Published On :: Mon, 24 Nov 2014 15:02:14 GMT Full Article headline government privacy cyberwar spyware symantec cryptography
ed Google Takes Symantec To The Woodshed For Mis-Issuing 30,000 HTTPS Certs By packetstormsecurity.com Published On :: Fri, 24 Mar 2017 14:43:45 GMT Full Article headline privacy flaw google symantec cryptography
ed Symantec Tricked Into Removing Legit Certificates By Security Researcher By packetstormsecurity.com Published On :: Fri, 21 Jul 2017 16:54:21 GMT Full Article headline hacker symantec cryptography
ed 23,000 HTTPS Certs Will Be Axed In Next 24 Hours Amid Bitter Turf War By packetstormsecurity.com Published On :: Thu, 01 Mar 2018 01:02:09 GMT Full Article headline privacy symantec cryptography
ed Symantec Plays Down Unreported Breach Of Test Data By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:13 GMT Full Article headline hacker data loss password symantec
ed 88 Cisco Products Affected By FragmentSmack By packetstormsecurity.com Published On :: Wed, 26 Sep 2018 16:24:18 GMT Full Article headline linux denial of service flaw cisco
ed Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco