The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Hackers stole Opera code signing certificate

Attackers distributed malware, signed by Opera Software.

06/27/2013

American program PRISM is used by the government to track down the activities of internet users

U.S. governmental agencies deny all the information about uncontrolled acquisition of citizens’ personal data.

06/10/2013

U.S. government monitors the phones calls of Verizon clients

NSA receives data about all calls, regardless of whether the subscriber is suspected of involvement in criminal or terrorist activities or not.

06/07/2013

Experts claim Drupal.org was hacked

Users are advised to change passwords.

05/30/2013

Hacker stole personal correspondence of the head of the U.S. National Intelligence Council

An attacker gained unauthorized access to the politician’s account at msn.com.

05/29/2013

Yahoo Japan suspects 22 million user IDs theft

Intrusion into Yahoo Japan systems occurred on May 16.

05/20/2013

The exploit for 0day-vulnerability in Linux 2.6.37 – 3.8.8

A patch for the vulnerability was released only for kernel version 3.8.9.

05/15/2013

Australian office of Google hacked

The hack was possible because of the vulnerability in the building's heating and cooling systems.

05/08/2013

Exploit for zero-day vulnerability in IE published in Metasploit

There is also an exploit for brute-force attack in Internet Explorer 10.

05/07/2013

Vulnerability discovered in Exim and Dovecot configuration

To exploit the vulnerability hackers need to send an email with a specifically crafted sender address to a mail server.

05/06/2013

Vulnerabilities in D-Link IP Cameras allow to capture video streams

Experts found five vulnerabilities in at least 14 company’s products.

04/30/2013

10 million Dutch people couldn’t pay bills because of DDoS-attack

The blockage of the National payment system left millions of Dutch of online ID.

04/25/2013

Malware spreads via Twitter

Attacks can be performed when introducing Javascript code into the victim’s Twitter account page.

04/23/2013

Critical vulnerabilities found in Linksys, Belkin, Netgear, Verizon and D-Link routers

Independent Security Evaluators researchers partially disclosed details of discovered flaws.

04/18/2013

Krebs: FSB arrested Phoenix Exploit Kit author

The young man was accused of spreading malware and illegal possession of firearms.

04/17/2013

Wordpress blogs suffer a large scale brute force attack

Scammers carry up to 77 thousand attempts daily to log into the Wordpress admin panels.

04/15/2013

Microsoft found a flaw in security bulletin MS13-036

Company deactivated bulletin KB 2823324 because of the bug.

04/12/2013

Critical vulnerability in ISC BIND

The flaw was found in versions of BIND for Unix/Linux-based systems.

04/01/2013

Russians created virus to steal banking credentials of Americans

Malware infected POS-terminals and ATMs of the largest U.S. banks.

04/01/2013

A zero-day vulnerability in roundcube

An attacker can overwrite any configuration variable and disclose contents of arbitrary files.

03/27/2013

EA Origin contains dangerous vulnerability

Gaming platform contains vulnerability which allows remote code execution.

03/19/2013

Trend Micro: Andromeda Botnet Returns

Traces of the botnet were found in spam-letters.

03/14/2013

US-CERT: Backdoor Existing In HP LaserJet Printers

Vulnerability grants the user of the local network with possibility to hijack important data.

03/13/2013

Oracle Launches an Emergency Fix for 0-day Java Vulnerabilities

Due to the frequent hackers’ attacks, the company for the second time violated the update release schedule.

03/05/2013

0-day Vulnerabilities in Adobe Reader and Acrobat

Company management says that the fix is yet to come.

02/14/2013

Zero day vulnerability in Microsoft IE exploited in the wild

New zero day vulnerability in Microsoft Internet Explorer spotted.

09/18/2012

Criminals actively exploit Java zero-day

Criminals actively use Java zero day vulnerability in targeted attacks.

08/28/2012

Large DNS hoster hit by DDoS attack

Zerigo restored its services with the help of Dallas and London ISPs.

07/24/2012

A Windows zero-day might be exploited to conduct industrial espionage

Website of a European aeronautical supplier compromised users’ systems with CVE-2012-1889 vulnerability.

06/21/2012

Flame uses Windows Update to propagate

Some modules of Flame spoof Windows Update queries and distribute the malware dropper.

06/05/2012

PHP CGI vulnerability is being massively exploited

Hackers exploit the vulnerability to create a backdoor and prevent its further use.

05/14/2012

Adobe patches a 0-day vulnerability

Vendor informs that vulnerability is being exploited in the course of an e-mail spam campaign.

05/05/2012

A zero-day vulnerability in Adobe Reader is used in attacks against U.S. military contractors

Adobe warns that hackers are exploiting a vulnerability in the latest versions of Adobe Reader and Acrobat to get access to computers running Microsoft Windows.

12/07/2011

Zero-day vulnerability in ISC BIND 9

Representatives of numerous organizations all over the Internet reported about crashes of BIND 9 DNS-servers performing recursive queries, which led to the denial of service.

11/17/2011

Vulnerability in OpenID Implementation Allows Unauthorized Data Manipulation

Last Thursday the OpenID foundation announced a weakness in Attribute Exchange extension.

05/09/2011

IncognitoRAT – A Cross-platform Malware in Java

McAffee spotted a new Java-based botnet. This particular malware can execute on Windows and Mac using Java inside Java Virtual Machine.

05/09/2011

Skype Vulnerable to Remote Code Execution on Mac OS X Machines

Skype has silently issued an updated version of their client on April 14, which fixed a remote code execution vulnerability.

05/09/2011

New Malware Laden's Death.doc Sent via E-mail

An e-mail containing a malicious Laden's Death.doc file attachment was personally sent to many recipients.

05/06/2011

News 1 - 38 of 38
First | Prev. | 1 | Next | Last Paged

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015