SupportAssist Flaw Exposes Dell Computers to Remote Hacking.

Dell Users beware – your systems can be compromised remotely. CVE-ID-2019-3719 Dell SupportAssist vulnerability. A 17-year-old independent security researcher – Bill Demirkapi , has discovered a critical remote code execution vulnerability in one of the pre-installed Dell tools, Dell SupportAssist utility which comes pre-installed on most of all Dell laptops, desktops and tablets. What is …

SupportAssist Flaw Exposes Dell Computers to Remote Hacking. Read More »

How to protect yourself against phishing ?

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Before we learn different ways for defending and protecting against phishing, lets learn types of phishing first. Some common forms of phishing: Spear Phishing : Phishing attempts directed …

How to protect yourself against phishing ? Read More »

WordPress Version 5.1.1 Patch Solves Remote Code execution flaw

Upgrade your wordpress sites to latest version of 5.1.1, before any hacker takes advantage of remote code execution vulnerability to take control of your sites and blogs. Simon Scannell a researcher from RIPS Technologies GmbH , known for disclosing multiple vulnerabilities in wordPress in past, has now revealed new RCE vulnerability. “Considering that comments are …

WordPress Version 5.1.1 Patch Solves Remote Code execution flaw Read More »

ALERT – New Phishing Attack – Hackers have come up with something new to beat the phishing experts too!

Hackers have come with something new to beat the phishing experts too! A cybersecurity researcher who last month warned of a creative phishing campaign has now shared details of a new but similar attack campaign with The Hacker News that has specifically been designed to target mobile users. Antoine Vincent Jebara, co-founder and CEO of …

ALERT – New Phishing Attack – Hackers have come up with something new to beat the phishing experts too! Read More »

Citrix data Breach – 6TB data stole by iranian hackers

FBI is investigating Citrix Data breach Citrix is working quickly in response to the incident. “We commenced a forensic investigation; engaged a leading cyber security firm to assist; took actions to secure our internal network; and continue to cooperate with the FBI,” the company states. The disclosure says that it’s believed the attackers used a …

Citrix data Breach – 6TB data stole by iranian hackers Read More »

Backstory – Cyber Security tool Powered by Google

At RSA 2019 Google’s Venture Chronicle announces their commercial Cyber Security tool – Backstory. Backstory is a cloud service based tool, built as a specialized layer on top of core Google infrastructure.It is designed in a way that enterprises could privately retain, analyze and search their massive amounts of security and network telemetry they generate …

Backstory – Cyber Security tool Powered by Google Read More »

Using GPON Routers, Are you safe ?

Over 1 Million GPON Users Are Unsafe, Be Aware Of New Zero Day Vulnerability – Security@Speaks Vulnerability: Dassan / GPON routers Remote Code Execution ExploitThere is a way to bypass all authentication on the devices (CVE-2018-10561), was found by VPNMentor. With this authentication bypass, it’s also possible to unveil another command injection vulnerability (CVE-2018-10562) and …

Using GPON Routers, Are you safe ? Read More »

google Chrome New Zero-Day Vulnerability

CVE : 2019-5786 Remote Code Execution Vulnerability in Google Chrome Browser. The vulnerability was discovered late February by Clement Lecigne, a security researcher at the Google Threat Analysis Group. According to an update to its original announcement and a tweet from Google Chrome’s security lead, the patched bug was under active attacks at the time …

google Chrome New Zero-Day Vulnerability Read More »