This Hack Gives Linux Root Shell Just By Pressing 'ENTER' for 70 Seconds

21/11/2016 13:25:45

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds....

Someone is Using Mirai Botnet to Shut Down Internet for an Entire Country

10/11/2016 17:25:03

Someone is trying to take down the whole Internet of a country, and partially succeeded, by launching massive distributed denial-of-service (DDoS) attacks using a botnet of insecure IoT devices infected by the Mirai malware....

SQL Injection Vulnerability in Joomla Component ja-k2-filter-and-search was Discovered

24/10/2016 10:10:12

In the past couple of days, Information Security experts discovered an SQL injection vulnerability in Joomla component ja-k2-filter-and-search....

NSA contractor charged with stealing secret data

18/10/2016 10:00:59

A federal contractor suspected in the leak of powerful National Security Agency hacking tools has been arrested and charged with stealing classified information from the U.S. government...

Why most of the CIO still choose to DIY their Private Cloud over the Public Cloud?

17/10/2016 16:56:33

Whenever you need to adapt a new technology or solution, you always have to make the right balance between benefits, risks & investment. ...

Nearly 800,000 FTP Servers Accessible Online Without Authentication

26/09/2016 14:30:04

A recent brute-force scan of FTP servers available online via an IPv4 address revealed that 796,578 boxes can be accessed without the need for any credentials....

MySQL Exploit Remote Root Code Execution Privesc Vulnerability

14/09/2016 18:30:34

An independent research has revealed multiple severe MySQL vulnerabilities. This advisory focuses on a critical vulnerability with a CVEID of CVE-2016-6662.which can allow attackers to (remotely) inject malicious settings into MySQL configuration files (my.cnf) leading to critical consequences....

Google Chrome to start marking HTTP connections as insecure

13/09/2016 15:17:57

To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser....

Best Practices to Protect yourself against Ransomware

07/09/2016 11:56:04

Ransomware is a malicious software that cyber-criminals use to hold your files (or computer) for ransom and requiring you to pay a certain amount of money to get them back by encrypting your files. How to protect yourself against it ?...

Zabbix SQL Injection Vulnerability

25/08/2016 12:30:59

On Aug 12th, 2016, 1n3 exposed by email that SQL injection vulnerability exists when jsrpc.php file of Zabbix processes profileIdx2 parameter, which is similar to a previous SQL injection with INSERT statement when latest.php file processes toggle_ids parameter. The only difference between the two is the attacking point. ...

Our Social Networks

Global Service Center:

COPYRIGHT © 2000-2018 SANGFOR TECHNOLOGIES INC. ALL RIGHTS RESERVED.