use Bogus MDM System Used To Hack iPhones In India By packetstormsecurity.com Published On :: Fri, 13 Jul 2018 15:57:49 GMT Full Article headline malware phone india fraud apple
use Location Data For Over 11,000 Indian Buses Left Exposed Online By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 15:58:00 GMT Full Article headline india data loss spyware
use Google Now Charges The Government For User Data Requests By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:45:22 GMT Full Article headline government privacy usa data loss google spyware
use NASA Hacker Refuses To Pay Compensation To US Government By packetstormsecurity.com Published On :: Thu, 14 Jul 2011 13:38:01 GMT Full Article headline hacker government usa romania
use Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer By packetstormsecurity.com Published On :: Mon, 24 Nov 2014 15:02:14 GMT Full Article headline government privacy cyberwar spyware symantec cryptography
use Google Makes Symantec An Offer It Can't Refuse By packetstormsecurity.com Published On :: Thu, 29 Oct 2015 15:42:12 GMT Full Article headline fraud google symantec cryptography
use Cisco Webex, Zoom Meetings Are Open To Snoopers, So Use Passwords By packetstormsecurity.com Published On :: Wed, 02 Oct 2019 14:55:12 GMT Full Article headline privacy data loss flaw password cisco spyware
use Microsoft Windows NtUserSetWindowFNID Win32k User Callback By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:32:16 GMT An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86. Full Article
use Microsoft Windows 7 (x86) BlueKeep RDP Use-After-Free By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:05:11 GMT Microsoft Windows 7 (x86) BlueKeep remote desktop protocol windows kernel use-after-free exploit. Full Article
use NSA Clears The Galaxy Note 4 And Galaxy S5 For Government Use By packetstormsecurity.com Published On :: Tue, 21 Oct 2014 13:12:14 GMT Full Article headline government usa phone nsa samsung
use Court Finds FBI Use Of NSA Database Violated Americans' 4th Amendment Rights By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:38 GMT Full Article headline government privacy usa data loss spyware fbi nsa
use Critical Windows Vuln Used To Rickroll The NSA And Github By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:22:30 GMT Full Article headline privacy microsoft flaw nsa cryptography
use Microsoft Windows NtUserMNDragOver Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:05:13 GMT This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008. Full Article
use Zappos Offers Users 10% Discount In 2012 Breach Settlement By packetstormsecurity.com Published On :: Fri, 18 Oct 2019 15:00:03 GMT Full Article headline hacker privacy data loss identity theft
use Data Leak Strikes US Cannabis Users, Sensitive Info Exposed By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:37 GMT Full Article headline privacy data loss identity theft
use The Doghouse: Crown Sterling By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 15:32:44 GMT Full Article headline fraud conference cryptography
use White House Expects To Veto Revised CISPA Bill By packetstormsecurity.com Published On :: Wed, 17 Apr 2013 05:48:19 GMT Full Article headline government privacy usa riaa mpaa
use CentOS Control Web Panel 0.9.8.838 User Enumeration By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 19:44:44 GMT CentOS Control Web Panel version 0.9.8.838 suffers from a user enumeration vulnerability. Full Article
use CentOS-WebPanel.com Control Web Panel 0.9.8.840 User Enumeration By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:54:03 GMT CentOS-WebPanel.com Control Web Panel (CWP) versions 0.9.8.836 through 0.9.8.840 suffer from a user enumeration vulnerability. Full Article
use CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.848 User Enumeration By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:02:22 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.848 suffers from a user enumeration vulnerability. Full Article
use Linux/x86 Add Root User Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 17:22:22 GMT 107 bytes small Linux/x86 shellcode that adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified. Full Article
use Linux/x86 Dynamic MMX+FPU Encoded Add Root User Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:22:22 GMT 155 bytes small Linux/x86 shellcode that has a MMX stub decoder that dynamically decodes the payload in memory. The FPU GetPC technique is used to determine the offset from EIP dynamically in running memory. Once decoded. this shellcode adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified. Full Article
use Crown Prince Of Saudi Arabia Accused Of Hacking Jeff Bezos' Phone By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 15:57:44 GMT Full Article headline hacker government usa phone amazon flaw cyberwar facebook saudi arabia
use netABuse Insufficient Windows Authentication Logic Scanner By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:57:25 GMT netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw. Full Article
use TV Monitoring Service Is Fair Use, Judge Rules By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 04:14:16 GMT Full Article headline government pirate
use The Pirate Bay Uses The Cloud To Stay Out Of Law Enforcement's Reach By packetstormsecurity.com Published On :: Mon, 22 Sep 2014 15:20:35 GMT Full Article headline government riaa mpaa pirate
use uTorrent Users Urged To Upgrade To Mitigate Hijacking Flaw By packetstormsecurity.com Published On :: Fri, 23 Feb 2018 15:16:09 GMT Full Article headline flaw pirate
use User Management System 2.0 Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:19:35 GMT User Management System version 2.0 suffers from a persistent cross site scripting vulnerability. Full Article
use vReliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation By packetstormsecurity.com Published On :: Mon, 23 Dec 2019 21:02:43 GMT This Metasploit module exploits a vulnerability in the rds_page_copy_user function in net/rds/page.c (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8 to execute code as root (CVE-2010-3904). This module has been tested successfully on Fedora 13 (i686) kernel version 2.6.33.3-85.fc13.i686.PAE and Ubuntu 10.04 (x86_64) with kernel version 2.6.32-21-generic. Full Article
use Zero-Click, Zero-Day Flaws In iOS Mail Used In Targeted VIP Attacks By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:08 GMT Full Article headline hacker phone flaw apple zero day
use Linux futex+VFS Use-After-Free By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:14:36 GMT Linux futex+VFS suffers from an improper inode reference in get_futex_key() that causes a use-after-free if the superblock goes away. Full Article
use Telegram Voicemail Hack Used Against Brazil's President, Ministers By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 15:54:32 GMT Full Article headline hacker government phone spyware brazil
use NSA Hacking Tools Used Against Nuke, Aerospace Worlds By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 14:35:34 GMT Full Article headline hacker government usa space data loss cyberwar nsa scada
use Russian Malware Used In An Attempt To Sabotage Saudi Petrol Plant By packetstormsecurity.com Published On :: Wed, 24 Oct 2018 14:14:11 GMT Full Article headline hacker malware russia cyberwar saudi arabia scada
use Facebook Must Face Renewed Privacy Lawsuit Over User Tracking By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:11 GMT Full Article headline government privacy usa facebook
use Windows User Accounts Penetration Testing By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 16:58:45 GMT Whitepaper called Windows User Accounts Penetration Testing. Written in Persian. Full Article
use Microsoft Windows 10 User Sessions Stuck By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 10:11:11 GMT This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT. Full Article
use LastPass Stores Passwords So Securely Users Cannot Access Them By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:45:09 GMT Full Article headline denial of service password
use AVideo Platform 8.1 User Enumeration By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:35:58 GMT AVideo Platform version 8.1 suffers from an information disclosure vulnerability that allows for user enumeration. Full Article
use Apple's Corellium Lawsuit Causes Chilling Effect With Security Researchers By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:58 GMT Full Article headline hacker phone apple
use DarkHotel Hackers Use VPN Zero-Day To Breach Chinese Government Agencies By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:18:05 GMT Full Article headline hacker government malware virus china cyberwar
use Facebook Phishing Campaign Hitting iOS Users By packetstormsecurity.com Published On :: Tue, 12 Mar 2019 14:50:22 GMT Full Article headline phone phish facebook social
use Phishing Emails Spoof WebEx Invites, Abuse Open Redirect By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:24 GMT Full Article headline fraud flaw cisco phish
use Charming Kitten Uses Fake Interview Requests To Target Public Figures By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:27:44 GMT Full Article headline cybercrime fraud phish
use Facebook Updates Data Use Policy To Appease Irish Government By packetstormsecurity.com Published On :: Mon, 14 May 2012 15:19:22 GMT Full Article headline government privacy facebook social ireland
use Microsoft Refuses To Hand Over Foreign Data, Held In Contempt Of Court By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 23:17:13 GMT Full Article headline government privacy microsoft usa data loss spyware ireland
use North Korean APT Uses Chrome Extension To Infect Victims By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 15:45:34 GMT Full Article headline hacker government malware cyberwar google korea chrome
use Google Chrome To Block Heavy Ads That Use Too Many Resources By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:06:10 GMT Full Article headline google chrome
use The White House Readies Draft Of Executive Order That Could Break The Internet By packetstormsecurity.com Published On :: Sat, 10 Aug 2019 16:23:17 GMT Full Article headline government usa facebook social censorship
use Tampa Mayor's Twitter Hacked, Used To Send Missile Threats By packetstormsecurity.com Published On :: Fri, 22 Feb 2019 01:03:30 GMT Full Article headline hacker government twitter terror