News Clipping

Linux Vulnerability Hits CentOS, Debian, and Red Hat Distros [latesthackingnews]

Researchers have discovered a critical vulnerability that allegedly affects multiple Linux distros. The vulnerability named Mutagen Astronomy allows an attacker to gain complete control of a targeted system through root access. This Linux vulnerabilityadversely impacts all current versions of Red Hat, Debian, and CentOS distributions. Mutagen Astronomy – Vulnerability Giving Root Access To Hackers Researchers at Qualys have discovered a critical security vulnerability that adversely affects...

Read More


GhostDNS: New Botnet Hijacked Over 100,000 Routers [source: thehackernews]

Chinese cybersecurity researchers have uncovered a widespread, ongoing malware campaign that has already hijacked over 100,000 home routers and modified their DNS settings to hack users with malicious web pages—especially if they visit banking sites—and steal their login credentials. Dubbed GhostDNS, the campaign has many similarities with the infamous DNSChanger malware that works by changing DNS server settings on an infected device, allowing attackers to route the users’...

Read More


Detecting ‘deepfake’ videos in the blink of an eye [source: theconversation]

A new form of misinformation is poised to spread through online communities as the 2018 midterm election campaigns heat up. Called “deepfakes” after the pseudonymous online account that popularized the technique – which may have chosen its name because the process uses a technical method called “deep learning” – these fake videos look very realistic. So far, people have used deepfake videos in pornography and...

Read More


GlobeImposter use new ways to spread to the globe [source: 360totalsecurity]

Recently, there have been many incidents of ransomware attacks. Once users are infected by ransomware, it is almost impossible to decrypt it by technical means that users can only be forced to abandon data or pay ransom to solve. Therefore, unlike other virus Trojans, the “pre-defense strategy” is different from the “after-the-fact killing strategy”. Today, we would like to make a brief summary of the...

Read More


Recent Windows zero-day vulnerability is exploited with Google Chrome [source: 360totalsecurity]

A few days ago, an elevation of privilege vulnerability in Windows was exposed, but only two days later, an organization called Powerpool was eyeing this vulnerability, and also produced a Trojan. Even though the Trojan is produced in a very short period, its attack power is still significant. Once the computer is attacked, the attacker can intercept the user’s screen to upload and download files,...

Read More


Page 39 of 123« First...102030...3738394041...506070...Last »