- Computer Attack -

Last update 09.10.2017 12:41:24

Introduction  List  Kategorie  Subcategory  0  1  2  3  4  5  6 



Date

Name

Category

Web

28.2.19

Topps.com Sports Collectible Site Exposes Payment Info in MageCart Attack

Attack

Bleepingcomputer

28.2.19

Social Media Attacks Generate $3.25 Billion for Crooks Each Year

Attack

Bleepingcomputer

28.2.19

Experts devised 3 attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityaffairs

28.2.19

Fighting credential stuffing attacks is an uphill battle

Attack

Net-security

28.2.19

Attackers continue to enhance their performance, apply smart business techniques

Attack

Net-security

27.2.19

Elasticsearch Clusters Under Attack From Multiple Hacking Groups

Attack

Securityweek

27.2.19

New Attacks Show Signed PDF Documents Cannot Be Trusted

Attack

Securityweek

27.2.19

New Attack Runs Code After Closing Browser Tab

Attack

Securityweek

27.2.19

‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud

Attack

Threatpost

26.2.19

Hackers Backdoor Cloud Servers to Attack Future Customers

Attack

Bleepingcomputer

26.2.19

PDF viewers, online validation services vulnerable to digital signature spoofing attacks

Attack

Net-security

26.2.19

ToRPEDO attack allows intercepting calls and track locations on 4G/5G

Attack

Securityaffairs

25.2.19

ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carrier

Attack

Threatpost

25.2.19

New privacy-breaking attacks against phones on 4G and 5G cellular networks

Attack

Net-security

25.2.19

ICANN warns of large-scale attacks on Internet infrastructure

Attack

Securityaffairs

23.2.19

Tax Returns Exposed in TurboTax Credential Stuffing Attacks

Attack

Bleepingcomputer

23.2.19

DDoS Attacks Ranked As Highest Threat by Enterprises

Attack

Bleepingcomputer

23.2.19

Warning Issued Over Attacks on Internet Infrastructure

Attack

Securityweek

20.2.19

Cyber and Physical Convergence Opens Doors for Attackers: Report

Attack

Securityweek

20.2.19

Supply Chain Attacks Nearly Doubled in 2018: SymantecAttack

Securityweek

16.2.19

Tips on How to Fight Back Against DNS Spoofing Attacks

Attack

Threatpost

15.2.19

Bank of Valletta shut down its operations after a cyber attack

Attack

Securityaffairs

15.2.19

Bank of Valletta suspended all operations in wake of cyber attack

Attack

Net-security

13.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Attack

Threatpost

13.2.19

Healthcare email fraud: Attack attempts jump 473% over two years

Attack

Net-security

12.2.19

Dunkin' Donuts Issues Alert for Credential Stuffing Attack, Passwords Reset

Attack  Incindent

Bleepingcomputer

12.2.19

New Offensive USB Cable Allows Remote Attacks over WiFi

Attack

Bleepingcomputer

11.2.19

Average DDoS attack volumes grew by 194% in 12 months

Attack

Net-security

8.2.19

ThreatList: Latest DDoS Trends by the Numbers

Attack

Threatpost

7.2.19

DDoS Attacks in Q4 2018

Analysis  Attack

Securelist

7.2.19

What do successful pentesting attacks have in common?

Attack

Net-security

6.2.19

What are Data Manipulation Attacks, and How to Mitigate Against Them

Attack

Threatpost

6.2.19

Reverse RDP Attack – Rogue RDP Server can be used to hack RDP clients

Attack

Securityaffairs

5.2.19

Mitigations against Mimikatz Style Attacks

Attack

SANS

5.2.19

RDP Clients Exposed to Reverse RDP Attacks by Major Protocol Issues

Attack

Bleepingcomputer

4.2.19

Attackers Use CoAP for DDoS Amplification

Attack

Securityweek

4.2.19

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Attack

Securityaffairs

2.2.19

Basecamp Successfully Defends Against Credential Stuffing Attack

Attack

Bleepingcomputer

2.2.19

Linux Kernel Spectre Protection Changes to Boost App Performance

Attack

Bleepingcomputer

1.2.19

DNS DDoS Attack Protections to be Forcefully Enabled for Non-Compliant Sites

Attack

Bleepingcomputer

31.1.19

Imperva mitigated DDoS attack generated 500 Million Packets per Second, the largest ever

Attack

Securityaffairs

31.1.19

Attackers Can Track Kids’ Locations via Connected Watches

Attack

Threatpost

29.1.19

Law enforcement worldwide hunting users of DDoS-for-Hire services

Attack

Securityaffairs

29.1.19

Researcher Escalates Privileges on Exchange 2013 via NTLM Relay Attack

Attack

Securityweek

29.1.19

Dailymotion forces password reset in response to credential stuffing Attack

Attack

Securityaffairs

29.1.19

Dailymotion Fights Ongoing Credential-Stuffing Attack

Attack

Threatpost

28.1.19

Dailymotion Resets Passwords After Credential Stuffing Attack

Attack

Bleepingcomputer

24.1.19

Link Found Between GreyEnergy and Zebrocy Attacks

Attack

Securityweek

24.1.19

Bit-and-Piece DDoS Method Emerges to Torment ISPs

Attack

Threatpost

24.1.19

PHP PEAR supply chain attack: Backdoor added to installer

Attack

Net-security

24.1.19

DHS issues emergency Directive to prevent DNS hijacking attacks

Attack

Securityaffairs

24.1.19

Cyberattacks fueled by geopolitical tension are increasing

Attack

Net-security

23.1.19

U.S. Gov Issues Urgent Warning of DNS Hijacking Attacks

Attack

Threatpost

23.1.19

Analyzing 2018 Attacks to Prepare for Those in 2019

AttackSecurityweek

23.1.19

DHS Warns Federal Agencies of DNS Hijacking Attacks

AttackSecurityweek

22.1.19

SSDP amplification attacks rose 639%

Attack

Net-security

21.1.19

Researchers analyze DDoS attacks as coordinated gang activities

Attack

Net-security

18.1.19

MageCart Skimmer Hits Hundreds of Sites In Ad Supply Chain Attack

Attack

Bleepingcomputer

17.1.19

Ongoing Attacks Hit West African Financial Institutions Since Mid-2017

AttackSecurityweek

17.1.19

Singapore Imposes $740,000 Fines Over Major Cyber Attack

Attack

Securityweek

16.1.19

ThreatList: $1.7M is the Average Cost of a Cyber-Attack

Attack

Threatpost

15.1.19

How to Secure Your Mid-Size Organization From the Next Cyber Attack

AttackThehackernews

15.1.19

Old RF Protocols Expose Cranes to Remote Hacker Attacks

Attack

Securityweek

13.1.19

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Attack

Securityaffairs

10.1.19

Biometrics in 2019: Increased Security or New Attack Vector?

AttackThreatpost

9.1.19

Shipping Firms Speared with Targeted ‘Whaling’ Attacks

Attack

Threatpost

9.1.19

Battling attacks from global criminal networks in the financial sector

Attack

Net-security

8.1.19

New Side-Channel Attack Steals Data from Windows, Linux Page Cache

AttackBleepingcomputer

8.1.19

OXO Discloses MageCart Attack That Targeted Customer Data on Oxo.com

AttackBleepingcomputer

8.1.19

Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack

AttackSecurityaffairs

8.1.19

New Side-Channel Attack Targets OS Page Cache

AttackSecurityweek

8.1.19

Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 Million

AttackThehackernews
5.1.19

igh Severity DoS bug affects Several Yokogawa products

Attack

Securityaffairs
30.12.18

US Investigating CenturyLink Internet Outage, 911 Failures

AttackSecurityweek

20.12.18

Remote Firmware Attack Renders Servers Unbootable

Attack

Thehackernews

19.12.18

Servers Can Be Bricked Remotely via BMC Attack

AttackSecurityweek

16.12.18

De-DOSfuscation Example

Attack

SANS

14.12.18

Shamoon Reappears, Poised for a New Wiper Attack

Attack  Virus

Net-security

13.12.18

Phishing Attack Through Non-Delivery Notification

Attack  Phishing

SANS

12.12.18Windows Kernel Vulnerability Exploited in AttacksAttack  VulnerebilitySecurityweek

12.12.18

Will sophisticated attacks dominate in 2019?

Attack

Net-security

11.12.18

Italian Oil Services Company Saipem Hit by CyberattackAttackSecurityweek

7.12.18

California Man Gets 26-Month Prison Sentence for DDoS AttacksAttackSecurityweek

7.12.18

Netbooks, RPis, & Bash Bunny Gear - Attacking Banks from the InsideAttackBleepingcomputer
6.12.182 Iranian Men Face New Charges Over Atlanta CyberattackAttackSecurityweek
2.12.18Cyberattacks on financial sector worries Americans mostAttack blogEset
30.11.18Zoom Conferencing App Exposes Enterprises to AttacksAttackSecurityweek
30.11.18

Hackers Breach Dunkin’ Donuts Accounts in Credential Stuffing Attack

Attack

Threatpost

29.11.18

Threat Actor Targets Middle East With DNS RedirectionsAttackSecurityweek
28.11.18Sennheiser Headset Software Could Allow Man-in-the-Middle SSL AttacksAttackBleepingcomputer

27.11.18

ECC Memory Vulnerable to Rowhammer AttackAttackThehackernews

21.11.18

Active XSS Attacks Targeting Amp for WP WordPress Plugin

Attack

Bleepingcomputer

19.11.18

Cryptojacking Attack Targets Make-A-Wish Foundation Website

Attack

Threatpost

17.11.18

Hacker Say They Compromised ProtonMail. ProtonMail Says It's BS.

AttackBleepingcomputer

16.11.18

State-Sponsored Actors Focus Attacks on Asia

AttackBleepingcomputer

16.11.18

Emoji Attack Can Kill Skype for Business Chat

Attack

Threatpost

15.11.18Boffins discovered seven new Meltdown and Spectre attacksAttackPBWCZ.CZ
9.11.18Man Behind DDoS Attacks on Gaming Companies Pleads GuiltyAttackPBWCZ.CZ
9.11.18Default Account Exposes Cisco Switches to Remote AttacksAttackPBWCZ.CZ
6.11.18Flaws in several self-encrypting SSDs allows attackers to decrypt data they containAttack  Crypto  VulnerebilityPBWCZ.CZ
3.11.18CISCO warn of a zero-day DoS flaw that is being actively exploited in attacksAttack  VulnerebilityPBWCZ.CZ
2.11.18Cyberattacks Against Energy Sector Are Higher Than Average: ReportAttackPBWCZ.CZ
2.11.18DDoS Attacks in Q3 18AttackPBWCZ.CZ
28.10.18A few dollars to bring down sites with new Bushido-based DDoS-for-hire serviceAttackPBWCZ.CZ
27.10.18BA Says 185,000 More Customers Affected in Cyber AttackAttack  IncindentPBWCZ.CZ
21.10.18Server With National Guard Personnel Data Target of AttackAttackPBWCZ.CZ
19.10.18NFCdrip Attack Proves Long-Range Data Exfiltration via NFCAttackPBWCZ.CZ
18.10.18Feds Investigate After Hackers Attack Water UtilityAttackPBWCZ.CZ
11.10.18Magecart Attack Hits 'Shopper Approved'AttackPBWCZ.CZ
10.10.18Researchers presented an improved version of the WPA KRACK attackAttackPBWCZ.CZ
10.10.18Researchers KRACK Wi-Fi Again, More Efficiently This TimeAttackPBWCZ.CZ
5.10.18Google Turns on G Suite Alerts for State-Sponsored AttacksAttackPBWCZ.CZ
2.10.18RDP Increasingly Abused in Attacks: FBIAttackPBWCZ.CZ
2.10.18FCA fines Tesco Bank £16.4m over 2016 cyber attackAttackPBWCZ.CZ
28.9.18Port of San Diego hit by a cyber attack a few days after the attack on the Port of BarcelonaAttackPBWCZ.CZ
28.9.18Man Sentenced to Prison for ATM JackpottingAttackPBWCZ.CZ
25.9.18Akamai Report: Credential stuffing attacks are a growing threatAttackPBWCZ.CZ
24.9.18Credential Stuffing Attacks Are Reaching DDoS ProportionsAttackPBWCZ.CZ
20.9.18Click2Gov Attacks on U.S. Cities Attributed to Previously Unknown GroupAttackPBWCZ.CZ
20.9.18Critical Vulnerability Impacts Hundreds of Thousands of IoT CamerasAttackPBWCZ.CZ
17.9.18Cyber attack took offline flight display screens at the Bristol AirportAttackPBWCZ.CZ
14.9.18Flaws in firmware expose almost any modern PC to Cold Boot AttacksAttackPBWCZ.CZ
14.9.18New Firmware Flaws Resurrect Cold Boot AttacksAttackPBWCZ.CZ
14.9.18One Year Later, Over 2 Billion Devices Still Exposed to BlueBorne AttacksAttackPBWCZ.CZ
14.9.18Multi-Stage Malware Heavily Used in Recent Cobalt AttacksAttack  VirusPBWCZ.CZ
4.9.18Thousands of 3D Printers Exposed to Remote AttacksAttackPBWCZ.CZ
26.8.18USBHarpoon a look-like charging cable that can hack into your computerAttackPBWCZ.CZ
23.8.18Attack on DNC Part of Simulated Phishing TestAttackPBWCZ.CZ
22.8.18Google Warns Thousands Each Month of State-Sponsored AttacksAttackPBWCZ.CZ
21.8.18NCC Group Releases Open Source DNS Rebinding Attack ToolAttackPBWCZ.CZ
17.8.18Industry Reactions to Foreshadow Flaws: Feedback FridayAttackPBWCZ.CZ
16.8.18PhishPoint Phishing Attack – A new technique to Bypass Microsoft Office 365 ProtectionsAttackPBWCZ.CZ
15.8.18Foreshadow Attacks – experts found 3 new Intel CPU side-channel flawsAttackPBWCZ.CZ
8.8.18DDoS Attacks Less Frequent But Pack More Punch: ReportAttackPBWCZ.CZ
7.8.18 SegmentSmack' Flaw in Linux Kernel Allows Remote DoS AttacksAttackPBWCZ.CZ
6.8.18Dept. of Energy announced the Liberty Eclipse exercise to test electrical grid against cyber attacksAttackPBWCZ.CZ
3.8.18Google Offers G Suite Alerts for State-Sponsored AttacksAttackPBWCZ.CZ
3.8.18Google introduced G Suite alerts for state-sponsored attacksAttackPBWCZ.CZ
3.8.18Attacks on industrial enterprises using RMS and TeamViewerAttackPBWCZ.CZ
2.8.18DDoS attacks in Q2 18AttackPBWCZ.CZ
28.7.18Microsoft Uncovers Multi-Tier Supply Chain AttackAttackPBWCZ.CZ
28.7.18Remote Spectre Attack Allows Data Theft Over NetworkAttackPBWCZ.CZ
28.7.18 Microsoft revealed details of a supply chain attack at unnamed Maker of PDF EditorAttackPBWCZ.CZ
28.7.18US-CERT warns of ongoing cyber attacks aimed at ERP applicationsAttackPBWCZ.CZ
24.7.18SpectreRSB – new Spectre CPU side-channel attack using the Return Stack BufferAttackPBWCZ.CZ
18.7.18CredSSP Flaw Exposes Pepperl+Fuchs HMI Devices to AttacksAttackPBWCZ.CZ
12.7.18Ticketmaster Breach: Tip of the Iceberg in Major Ongoing Magecart AttacksAttackPBWCZ.CZ
2.7.18Researchers Create Attacks That Compromise LTE Data CommunicationAttackPBWCZ.CZ
1.7.18Security issues in the LTE standard expose billions on mobile users to attacksAttackPBWCZ.CZ
29.6.18Researchers Devise Rowhammer Attacks Against Latest Android VersionsAttackPBWCZ.CZ
29.6.18 Apophis Squad hacker group is the alleged responsible for the DDoS attack against ProtonMailAttackPBWCZ.CZ
28.6.18Significant DDoS Attack on ProtonMail Blamed on Russia-Linked GroupAttackPBWCZ.CZ
28.6.18SSDP Diffraction Abused for DDoS AmplificationAttackPBWCZ.CZ
26.6.18 China-linked Hackers Targeting Air-Gapped Systems: ReportAttackPBWCZ.CZ
21.6.18Google Devices Leak Precise Physical Locations: ResearcherAttackPBWCZ.CZ
6.6.18 Many Drupal Sites Still Vulnerable to Drupalgeddon2 AttacksAttackPBWCZ.CZ
3.6.18Hardcoded Credentials Expose Yokogawa Controllers to AttacksAttackPBWCZ.CZ
2.6.18Punycode Makes SMiShing Attacks More DeceivingAttackPBWCZ.CZ
2.6.18Crashing HDDs by launching an attack with sonic and ultrasonic signalsAttackPBWCZ.CZ
29.5.18Attack Bypasses AMD's Virtual Machine EncryptionAttackPBWCZ.CZ
28.2.18Memcached Servers Abused for Massive Amplification DDoS AttacksAttackPBWCZ.CZ
28.7.18Memcached Abused for DDoS Amplification AttacksAttackPBWCZ.CZ
24.2.18Disappearing bytes: Reverse engineering the MS Office RTF parserAttackPBWCZ.CZ
20.2.18A new multi-stage attack deploys a password stealer without using macrosAttackPBWCZ.CZ