software

  1. Father

    What does malicious software look like?

    The variety of security tools is largely due not only to the number of" entry points " in different ICS, but also to the number of different types of malware, each of which can solve a specific task or several at once. Malicious software (VPO) or malware is the collective name of all utilities...
  2. Father

    Open Data intelligence: who is considered OSINT software?

    To find information about a person or company, now just Google it. If there is no information in the search engine, social networks will help. The Internet has given humanity a sea of open data sources. OSINT analysts know how to use them correctly. What exactly do they do? How did open data...
  3. Father

    Cordova App Harness: confusion of dependencies gives hackers access to other people's software

    How a project that was closed 5 years ago almost led to a disaster for the supply chain. Recently, security researchers identified a new Dependency Confusion vulnerability affecting an archived Apache project called Cordova App Harness. Thanks to the vulnerability, attackers can force the...
  4. Father

    Due to a software failure, the casino issued $2 million to players

    Unexpected Bounty A software glitch at Star Casino in Sydney, Australia, led to the casino inadvertently giving away money for several weeks, writes The Register. 3.2 million Australian dollars (or $2.05 million) were distributed by mistake. As it turned out, for many years Star Casino had...
  5. Father

    Vulnerability in NASA software: a small mistake will lead to an aerodynamic disaster

    An error that threatens accidents during testing of hypersonic weapons has been found. A research team from China has reported a critical flaw in NASA's hypersonic aerodynamics simulation software. This is stated in an article published on March 14 in the authoritative Chinese scientific...
  6. J

    VENDORS WANTED!!

    We got a telegram channel with over 1500 members but we need them vendors to list shit on there! Channel: https://t.me/SilkLane Hit me up for more details!
  7. Teacher

    Software supply chain - the main loophole for hackers: 10 main dangers for companies

    The rating shows what you need to pay attention to when planning cyber defense. The European Cybersecurity Agency (ENISA) has updated its cyber threat forecast, highlighting the top 10 threats that will have the greatest impact by 2030. Compromising the software supply chain came first, albeit...
  8. Teacher

    Vulnerability in the software of the reg.ru client became a loophole for hackers from UHG

    On March 18, attackers attacked the servers of a Russian domain registrar. The Russian domain registrar and hosting provider reg.ru, which serves 44% of domains in the .ru zone, was attacked by hackers. The attackers tried to break into one of the company's virtual hosting servers, the reg.ru...
  9. Teacher

    Old software in a new wrapper: Nutanix sues Tessel

    It seems that the theft of intellectual property did not go exactly according to plan. The American company Nutanix, specializing in databases and cloud computing, recently filed a lawsuit against the startup Tessell, which provides DBaaS services. Founded by three former key Nutanix employees...
  10. Teacher

    Women are the main targets: stalker software as a new pandemic in the digital age

    How control and harassment became weapons of the 21st century. Kaspersky Lab conducted a survey of more than 20,000 people around the world and found that cybercrime has reached the scale of a pandemic and is now a widespread threat in almost every country. The report focuses on stalking...
  11. Teacher

    In Komi, employees of the Ministry of Internal Affairs of Russia and the police of the republic identified a teenager who sold malicious software

    In the Komi Republic, employees of the Department for Organizing the Fight against the Illegal Use of Information and Communication Technologies of the Ministry of Internal Affairs of Russia, together with colleagues from the republican police, as a result of operational search activities...
  12. Teacher

    CVE-2024-1403: New high-profile bug in Progress Software

    How just one bug in the authorization process can lead to a digital catastrophe. In the field of information security, a critical vulnerability was discovered that affects Progress Software products, in particular, OpenEdge Authentication Gateway and AdminServer. This vulnerability poses a...
  13. Teacher

    Open source: between trust and threat. How does "protest software" change the development world?

    Developers use open source software as a means of expressing their political views, but what are the consequences? In today's world of software development, professionals do not create their products from scratch, but use ready-made components, similar to the car manufacturing process, where...
  14. Teacher

    LockBit Uprising: Ransomware infects hundreds of ScreenConnect servers with outdated software

    Operators continue to carry out attacks, despite the elimination of their infrastructure. Attackers are actively exploiting the ScreenConnect vulnerability to break into non-updated servers in order to deploy the LockBit ransomware program on compromised networks. The authentication bypass...
  15. Brother

    TeamViewer is back in the attackers arsenal: how legitimate software helps break into large companies

    Where do hackers get credentials for penetration and is it possible to prevent it? A recent report from Huntress revealed that cybercriminals are once again using TeamViewer, a legitimate remote access tool, to initially break into corporate devices and attempt to deploy cryptographers. For...
  16. Saint.Laurent

    { DEVELOPMENT } Websites | Scripts | Bots | Software | Extensions | Services - Сайты | Cкрипты | Боты | Софт | Расширения | Услуги

    Websites ┎╸ Landing / Corporate ┠╸ Blogs / Catalogs ┠╸ CRM / Admin panel / Work panel ┠╸ Creating an API / Interacting with an API ┠╸ Online Stores / Car Sales Stores ┠╸ Crypto services / Exchangers / Exchanges / Mixers ┠╸ Escrow services / Trading platforms / Forums ┖╸ Projects according to...
  17. Brother

    Double blow to Ivanti software: simultaneous exploitation of new 0-day releases hackers hands

    The patch is still missing. Malicious requests and arbitrary commands will continue to haunt corporate users for a long time to come. Ivanti revealed the presence of two zero-day vulnerabilities in its Connect Secure and Policy Secure products, which were successfully exploited by attackers...
  18. Brother

    Software security starts with the developer: GitHub introduces mandatory two-factor authentication

    Users run the risk of losing access to the code if they ignore the requirement. GitHub announced that from January 19, 2024, users working with code on the site will be required to activate two-factor authentication (2FA). This is reported in emails sent to users on Christmas Eve. The company...
  19. S

    FULL CLONING SOFTWARE PACKAGE WITH IST FILES, FULL CLONING TUTORIALS AND MORE...

    What do we offer? • 💻 - Full software package for cloning (ATR, EMV, X2 etc.): €125 • 📖 - Full cloning tutorial (step by step guide): €75 • 🧾 - Full refund method (the most extensive method out there): €50 Tap in, don't miss your chance to make some bands. Payment method: Bitcoin...
  20. Brother

    Check your software: Lazarus attacks npm package supply chain

    Using a multi-level upload method, hackers carefully hide their activity. Chinese information security company QiAnXin has discovered a new campaign called Lazarus grouping, which uses npm packages to attack the supply chain using a multi-level upload method to hide traces of the attack. Based...
Top