re Nokia Paid Millions To Software Blackmailers Six Years Ago By packetstormsecurity.com Published On :: Wed, 18 Jun 2014 15:25:27 GMT Full Article headline phone cybercrime data loss fraud cryptography finland nokia
re VeriSign Addresses SSL Certificate Flaw By packetstormsecurity.com Published On :: Mon, 05 Jan 2009 01:25:19 GMT Full Article verisign flaw ssl
re ICANN Under Fire Over Domain Name Expansion By packetstormsecurity.com Published On :: Wed, 03 Apr 2013 04:10:56 GMT Full Article headline government dns verisign
re Survey - Privacy Breaches Rampant In Corporations By packetstormsecurity.com Published On :: Thu, 13 Dec 2007 10:37:33 GMT Full Article privacy survey
re Soaraway Security Spending Keeps Breaches In Check By packetstormsecurity.com Published On :: Tue, 22 Apr 2008 19:20:07 GMT Full Article survey
re Vista Security Credentials Tarnished In Malware Survey By packetstormsecurity.com Published On :: Fri, 09 May 2008 15:56:28 GMT Full Article malware microsoft survey
re Data Breaches Cost $6.6 Million On Average, Survey Finds By packetstormsecurity.com Published On :: Sun, 01 Feb 2009 19:38:48 GMT Full Article survey data loss
re Survey Reveals Culture Of IT Admin Snooping By packetstormsecurity.com Published On :: Thu, 11 Jun 2009 16:57:54 GMT Full Article privacy survey
re Survey - Hackers On Vacation Before Q4 Saturation By packetstormsecurity.com Published On :: Wed, 26 Aug 2009 10:43:39 GMT Full Article hacker privacy survey
re Survey - Half Of Businesses Do Not Secure Personal Data By packetstormsecurity.com Published On :: Thu, 24 Sep 2009 22:30:35 GMT Full Article privacy survey
re TSA iPhone App Is Like Yelp For Pre-Flight Pat-Downs By packetstormsecurity.com Published On :: Tue, 05 Jan 2010 02:21:30 GMT Full Article government survey phone apple
re Most Consumers Reuse Banking Passwords On Other Sites By packetstormsecurity.com Published On :: Tue, 02 Feb 2010 05:26:33 GMT Full Article bank survey password
re Survey - Cloud Computing Risks Outweigh Reward By packetstormsecurity.com Published On :: Wed, 07 Apr 2010 03:30:45 GMT Full Article survey russia
re 1 In 10 Americans Prefer Colonoscopies To PC Security By packetstormsecurity.com Published On :: Thu, 16 Sep 2010 00:53:32 GMT Full Article survey usa
re Firefox 26 Bumps Up Security By Blocking Java Plugins By packetstormsecurity.com Published On :: Wed, 11 Dec 2013 07:15:24 GMT Full Article headline mozilla firefox java
re Yahoo Found Serving Java-Malware Spreading Ads By packetstormsecurity.com Published On :: Mon, 06 Jan 2014 15:59:15 GMT Full Article headline malware yahoo java
re Oracle Is Addressing 36 Java Vulnerabilities By packetstormsecurity.com Published On :: Mon, 13 Jan 2014 15:32:58 GMT Full Article headline flaw patch oracle java
re Oracle Releases 167 Critical Security Fixes For Java And Sun Systems By packetstormsecurity.com Published On :: Tue, 20 Jan 2015 16:17:47 GMT Full Article headline flaw patch oracle java
re Whisper This, But Java Deserialization Vulnerability Affects More Libraries By packetstormsecurity.com Published On :: Mon, 07 Dec 2015 15:03:13 GMT Full Article headline flaw oracle java
re Java Plug-In Malware Alert To Be Issued By Oracle By packetstormsecurity.com Published On :: Tue, 22 Dec 2015 17:11:10 GMT Full Article headline malware flaw oracle java
re Jenkins Vuln Makes For Great Monero Mining Slaves By packetstormsecurity.com Published On :: Tue, 20 Feb 2018 13:57:33 GMT Full Article headline malware flaw cryptography java
re Oracle Releases 254 Security Fixes By packetstormsecurity.com Published On :: Fri, 20 Apr 2018 01:24:33 GMT Full Article headline flaw patch oracle java
re Researcher Says NSA's Ghidra Tool Can Be Used For RCE By packetstormsecurity.com Published On :: Wed, 20 Mar 2019 13:34:51 GMT Full Article headline hacker flaw nsa java
re Scientologist Overlord Declares Victory Over Anonymous By packetstormsecurity.com Published On :: Fri, 17 Dec 2010 16:26:25 GMT Full Article headline hacker religion
re Stuxnet Scored Quick Hit On First Target, Says Researcher By packetstormsecurity.com Published On :: Tue, 15 Feb 2011 04:40:49 GMT Full Article headline malware worm symantec iran
re US And Israel Were Behind Stuxnet Claims Researcher By packetstormsecurity.com Published On :: Mon, 07 Mar 2011 02:39:03 GMT Full Article headline malware usa israel worm iran
re Stuxnet-Like Attacks Beckon As 50 New SCADA Threats Discovered By packetstormsecurity.com Published On :: Thu, 21 Apr 2011 21:50:16 GMT Full Article headline malware worm
re Worm Spreading Via RDP By packetstormsecurity.com Published On :: Mon, 29 Aug 2011 14:01:07 GMT Full Article headline microsoft worm
re New Worm By Creators Of Stuxnet Is Suspected By packetstormsecurity.com Published On :: Wed, 19 Oct 2011 04:22:00 GMT Full Article headline worm
re Worm Steals 45,000 Facebook Passwords, Researchers Say By packetstormsecurity.com Published On :: Fri, 06 Jan 2012 00:31:34 GMT Full Article headline malware worm facebook social
re Massive Cyber-Attack Discovered, Researchers Say By packetstormsecurity.com Published On :: Tue, 29 May 2012 15:19:27 GMT Full Article headline hacker malware israel worm iran
re 'Super-Powerful' Flame Worm Actually Boring Bloatware By packetstormsecurity.com Published On :: Thu, 31 May 2012 16:51:20 GMT Full Article headline malware worm
re Rare AutoCAD Worm Lifted Blueprints From Peru, Sent Them To China By packetstormsecurity.com Published On :: Fri, 22 Jun 2012 03:47:39 GMT Full Article headline malware china cybercrime flaw worm
re Dorkbot Ransomware Worm Targets Skype Users By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:07 GMT Full Article headline malware bank worm skype
re FutureSoft TFTP Server 2000 Transfer-Mode Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all). Full Article
re Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
re Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow By packetstormsecurity.com Published On :: Mon, 26 Jul 2010 20:18:25 GMT This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue. Full Article
re Oracle Weblogic Apache Connector POST Request Buffer Overflow By packetstormsecurity.com Published On :: Fri, 18 May 2012 14:58:27 GMT This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header. Full Article
re Anonymous Threatens Mexican Drug Cartel By packetstormsecurity.com Published On :: Mon, 31 Oct 2011 15:49:05 GMT Full Article headline anonymous mexico
re Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
re Mexican Tax Refund Site Leaked 400GB Of Sensitive Customer Info By packetstormsecurity.com Published On :: Sat, 09 Sep 2017 16:22:32 GMT Full Article headline government privacy data loss fraud mexico
re ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
re Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
re Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
re Using ShoutBoxes To Control Malicious Software By packetstormsecurity.com Published On :: Tue, 14 Apr 2009 23:17:50 GMT Whitepaper called Using "ShoutBoxes" to control malicious software. Full Article
re LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
re PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
re Linksys E-Series Remote Code Execution By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 03:33:33 GMT Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm. Full Article
re Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
re Linksys E-Series TheMoon Remote Command Injection By packetstormsecurity.com Published On :: Sat, 05 Apr 2014 03:11:21 GMT Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command injection. This vulnerability was used from the so called "TheMoon" worm. There are many Linksys systems that might be vulnerable including E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This Metasploit module was tested successfully against an E1500 v1.0.5. Full Article