Exploit : RuggedCom Devices Backdoor Access
Title: Undocumented Backdoor Access to RuggedCom Devices Author: jc Organization: JC CREW Date: April 23, 2012 CVE: CVE-2012-1803 Background: RuggedCom is one of a handful of networking vendors who...
View ArticleWordPress WPtouch Mobile 3.4.5 Shell Upload
Wordpress WPtouch Mobile Plugin File Upload Vulnerability ================================= ==================== ______ ___/ / / / / / / /___ ____ ___/__ / / ____ ____ _______ ____ ___/ / : / /...
View ArticleSenator: Backdoor for the Feds is a backdoor for hackers
A US Senator is urging Congress to pass laws forbidding Uncle Sam's spies from forcing software and hardware makers to build backdoors. In an op-ed posted in the LA Times, Sen. Ron Wyden (D-OR) said...
View ArticleLatest version of OS X closes backdoor bug that gives root
For at least four years, a bug in Apple's OS X gave untrusted users—and possibly remote hackers with only limited control of their target—unfettered "root" privileges over Macs. The vulnerability is...
View ArticleChinese hacker group has been spying on governments for a decade, says FireEye
A CHINESE CYBER THREAT GROUP is said to have one of the longest ever cyber espionage operation histories, having spied on governments for over a decade. The APT 30 hacker group was uncovered by...
View ArticleNorth Korea exploits 0-day in Seoul’s favourite word processor
FireEye researchers Genwei Jiang and Josiah Kimble say attackers from North Korea exploited a zero day vulnerability in a word processor popular with the South Korea's government. The attackers went...
View Article