Yearly Archives: 2019

/2019

Using Oracle WebLogic? Put down your coffee, drop out of Discord, grab this patch right now: Vuln under attack

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Oracle has issued an emergency critical update to address a remote code execution vulnerability in its WebLogic Server component for Fusion Middleware – a flaw miscreants are exploiting in the wild to hijack systems.

The programming blunder, designated CVE-2019-2729, is present […]

By |June 20th, 2019|Cyber News|

Awoogah! Awoogah! Firefox fans urged to update and patch zero-day hole exploited in the wild by miscreants

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Mozilla has released an emergency critical update for Firefox to squash a zero-day vulnerability that is under active attack.

The Firefox 67.0.3 and ESR 60.7.1 builds include a patch for CVE-2019-11707. The vulnerability is a type confusion bug in the way Firefox […]

By |June 19th, 2019|Cyber News|

Delicious irony: Hacked medical debt collector AMCA files for bankruptcy protection from debt collectors

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The healthcare debt collector ransacked by hackers, who gained access to millions of patients’ personal information, has filed for bankruptcy protection.

Retrieval Masters Creditors Bureau, aka American Medical Collection Agency, told the Southern New York US District Court this week […]

By |June 19th, 2019|Cyber News|

Freaking out about fiendish IoT exploits? Maybe stop disable telnet and change that default password first?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

While netizens and journalists worry about criminals and spies using sophisticated cyber-weapons to hijack Internet of Things devices, basic security protections are being overlooked – and pose a far greater threat.

Miscreants targeting internet-connected devices, especially those found in homes […]

By |June 18th, 2019|Cyber News|

Smash GandCrab: Free tools released to decrypt files scrambled by notorious ransomware

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Victims of the latest incarnations of the GandCrab ransomware now have a way to reclaim their files without paying a penny to extortionists, thanks to the release of a decryption tool.

Infosec shop BitDefender said this week it has teamed up with […]

By |June 18th, 2019|Cyber News|

Samsung reminds rabble to scan smart TVs for viruses – then tries to make them forget

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Samsung on Sunday sent out a tweet urging people to check their Sammy smart TVs for viruses – and then deleted the message, as if someone realized that highlighting the risks posed by connected TVs may be bad for business.

The Twitter […]

By |June 18th, 2019|Cyber News|

Why are fervid Googlers making ad-blocker-breaking changes to Chrome? Because they created a monster. And are fighting to secure it

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Analysis In a mild PR blitz, Google engineers this month insisted the ad giant’s shake up of Chrome browser extensions won’t kill advert blockers. Instead, we’re told, Googlers are making the plugins safer. Those engineers have more work to do than it […]

By |June 17th, 2019|Cyber News|

RAMBleed picks up Rowhammer, smashes DRAM until it leaks apps’ crypto-keys, passwords, other secrets

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Bit boffins from Australia, Austria, and the US have expanded upon the Rowhammer memory attack technique to create more dangerous variation called RAMBleed that can expose confidential system memory.

The memory integrity issue tied to Rowhammer was known to Intel […]

By |June 12th, 2019|Cyber News|

Wondering where that upcoming meeting with ‘Cheap Viagra’ came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics…

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Spammers are abusing the preferential treatment Google affords its own apps to score free passes through Gmail’s spam filters, it was claimed this week.

The ad giant greases the wheels so that incoming messages involving Google Calendar and other Big-G […]

By |June 12th, 2019|Cyber News|

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Boffins from Graz University of Technology in Austria have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware to fingerprint browsers and improve the effectiveness of […]

By |June 11th, 2019|Cyber News|