k Soca Website Attack: Norway Arrests Two Youths By packetstormsecurity.com Published On :: Wed, 09 May 2012 15:58:55 GMT Full Article headline hacker denial of service mpaa norway
k FBI Arrests 24 In Card Fraud Takedown By packetstormsecurity.com Published On :: Wed, 27 Jun 2012 14:21:28 GMT Full Article headline bank usa britain cybercrime germany fbi norway
k KeeWeb 1.14.0 HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:23:04 GMT KeeWeb version 1.14.0 suffers from an html injection vulnerability. Full Article
k Exposed Database Dumps PII Of 1.6 Million Job Seekers By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:55 GMT Full Article headline privacy database data loss
k Exposed Orvibo Database Leaks Two Billion Records By packetstormsecurity.com Published On :: Tue, 02 Jul 2019 13:57:53 GMT Full Article headline privacy database china data loss
k Hacker Site's Incriminating Database Published Online By Rivals By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:24 GMT Full Article headline hacker privacy database data loss cyberwar
k 700,000 Choice Hotels Records Leaked In Data Breach, Ransom Demanded By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 16:15:26 GMT Full Article headline privacy database data loss
k 198M Records Of Prospective Auto Buyers Leaked By packetstormsecurity.com Published On :: Mon, 16 Sep 2019 14:36:04 GMT Full Article headline privacy database data loss
k Gootkit Crew Left Database Exposed Without A Password By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 14:27:20 GMT Full Article headline malware database data loss fraud
k Leaky Autoclerk Database Exposes Info On Travelers By packetstormsecurity.com Published On :: Mon, 21 Oct 2019 16:39:14 GMT Full Article headline government privacy database data loss spyware military
k Unsecured Database Leaks Movie Chain Customer Info By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:45:25 GMT Full Article headline privacy database data loss
k Another File Integrity Checker 2.13-1 By packetstormsecurity.com Published On :: Wed, 21 Jan 2009 01:47:16 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker By packetstormsecurity.com Published On :: Tue, 28 Jul 2009 15:00:09 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Check Rootkit 0.49 By packetstormsecurity.com Published On :: Thu, 30 Jul 2009 16:01:02 GMT Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11. Full Article
k Rootkit Hunter 1.3.6 By packetstormsecurity.com Published On :: Mon, 30 Nov 2009 22:01:27 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
k Another File Integrity Checker 2.15 By packetstormsecurity.com Published On :: Sat, 24 Apr 2010 02:44:33 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Rootkit Hunter 1.3.8 By packetstormsecurity.com Published On :: Thu, 18 Nov 2010 00:42:04 GMT Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD. Full Article
k Another File Integrity Checker 2.16 By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 11:07:22 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 2.17 By packetstormsecurity.com Published On :: Fri, 10 Jun 2011 21:53:34 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 2.18 By packetstormsecurity.com Published On :: Tue, 11 Oct 2011 01:59:54 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 2.19 By packetstormsecurity.com Published On :: Wed, 16 Nov 2011 04:08:37 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 2.20 By packetstormsecurity.com Published On :: Tue, 07 Feb 2012 23:12:30 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 2.21 By packetstormsecurity.com Published On :: Tue, 17 Jul 2012 00:25:58 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 3.1 By packetstormsecurity.com Published On :: Thu, 26 Jul 2012 01:36:53 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 3.2 By packetstormsecurity.com Published On :: Wed, 14 Nov 2012 00:16:44 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 3.3 By packetstormsecurity.com Published On :: Thu, 27 Dec 2012 16:38:21 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Another File Integrity Checker 3.4 By packetstormsecurity.com Published On :: Tue, 10 Sep 2013 16:18:25 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
k Chkrootkit Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 20 Nov 2015 01:09:39 GMT Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. WfsDelay is set to 24h, since this is how often a chkrootkit scan is scheduled by default. Full Article
k Attack On Apache Server Exposes Firewalls, Routers, Etc By packetstormsecurity.com Published On :: Thu, 06 Oct 2011 02:06:20 GMT Full Article headline flaw apache
k Apache Server Status Pages Put Popular Websites At Risk By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 04:02:21 GMT Full Article headline privacy data loss flaw apache
k Apache Plug-In Doles Out Zeus Attack By packetstormsecurity.com Published On :: Thu, 20 Dec 2012 14:55:43 GMT Full Article headline malware trojan botnet apache
k Hackers Hit Thousands Of Sites With Apache Backdoor By packetstormsecurity.com Published On :: Tue, 30 Apr 2013 00:02:31 GMT Full Article headline malware backdoor apache
k Apache ActiveMQ Flaws Leave Servers Open To DoS Attacks By packetstormsecurity.com Published On :: Mon, 09 Mar 2015 20:04:49 GMT Full Article headline denial of service flaw apache
k Apache Struts 2 Needs Patching, Without Delay. It's Under Attack Now. By packetstormsecurity.com Published On :: Thu, 09 Mar 2017 16:15:22 GMT Full Article headline hacker flaw apache
k ZDI Is Throwing Out $200k Bug Bounties On Apache And Microsoft IIS By packetstormsecurity.com Published On :: Wed, 25 Jul 2018 17:02:50 GMT Full Article headline hacker microsoft flaw apache
k Apache Vulnerabilities Spotted In OpenWhisk And Tomcat By packetstormsecurity.com Published On :: Wed, 25 Jul 2018 17:02:58 GMT Full Article headline flaw apache
k Apache Struts Vulnerability Would Allow System Takeover By packetstormsecurity.com Published On :: Tue, 06 Nov 2018 23:26:37 GMT Full Article headline flaw apache
k Apache Hadoop Spins Cracking Code Injection Vulnerability YARN By packetstormsecurity.com Published On :: Mon, 26 Nov 2018 15:31:20 GMT Full Article headline flaw apache
k Contest Seeks The Most Diminutive XSS Worm By packetstormsecurity.com Published On :: Sat, 05 Jan 2008 08:06:56 GMT Full Article worm xss
k Facebook Vulnerable To Critical XSS, Could Lead To Malware Attacks By packetstormsecurity.com Published On :: Fri, 23 May 2008 08:26:21 GMT Full Article malware facebook xss
k XSS Flaws Poke Ridicule At Entertainment Industry By packetstormsecurity.com Published On :: Fri, 08 May 2009 09:06:46 GMT Full Article flaw xss
k Mozilla Tackles XSS Vulnerabilities With New Technology By packetstormsecurity.com Published On :: Mon, 22 Jun 2009 16:29:11 GMT Full Article mozilla xss
k MoD Website Outflanked By XSS Flaws By packetstormsecurity.com Published On :: Mon, 10 Aug 2009 02:30:05 GMT Full Article flaw xss
k Facebook App Flaws Create Trojan Download Risk By packetstormsecurity.com Published On :: Mon, 21 Sep 2009 16:04:03 GMT Full Article trojan flaw facebook xss
k IE 8 XSS Filter Exposes Sites To XSS Attacks By packetstormsecurity.com Published On :: Mon, 19 Apr 2010 19:23:01 GMT Full Article microsoft xss
k XSS Flaw Discovered In Skype's Shop, User Accounts Targeted By packetstormsecurity.com Published On :: Fri, 24 Feb 2012 23:57:20 GMT Full Article headline flaw identity theft skype social xss
k macOS Kernel wait_for_namespace_event() Race Condition / Use-After-Free By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 14:08:33 GMT In the macOS kernel, the XNU function wait_for_namespace_event() in bsd/vfs/vfs_syscalls.c releases a file descriptor for use by userspace but may then subsequently destroy that file descriptor using fp_free(), which unconditionally frees the fileproc and fileglob. This opens up a race window during which the process could manipulate those objects while they're being freed. Exploitation requires root privileges. Full Article
k Anonymous Hacker Exposed After Dropping USB Drive While Throwing Molotov Cocktail By packetstormsecurity.com Published On :: Mon, 24 Jun 2019 16:43:35 GMT Full Article headline hacker government anonymous
k Hacktivism Activity And Chatter Has Markedly Dropped Since 2016 By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:25:32 GMT Full Article headline hacker government anonymous
k US Marines Capture Ship Hijacked By Pirates Off Somalia By packetstormsecurity.com Published On :: Thu, 09 Sep 2010 15:09:33 GMT Full Article usa africa