Satoshi Nakamoto Blog

Tag : Hacking

Browser Extensions Chrome chrome extension Cross site scripting cyber security Universal XSS Web Application Security Web Application Vulnerability WEBSITE HACKING

Critical Flaw Reported in Popular Evernote Extension for Chrome Users

satoshi
Cybersecurity researchers discover a critical flaw in the popular Evernote Chrome extension that could have allowed hackers to hijack your browser and steal sensitive information
China DDoS Attack digital protest encrypted messaging apps Hong Kong secure messaging app surveillance Telegram Telegram Messenger

Telegram Suffers ‘Powerful DDoS Attack’ From China During Hong Kong Protests

satoshi
Telegram, one of the most popular encrypted messaging app, briefly went offline yesterday for hundreds of thousands of users worldwide after a powerful distributed denial-of-service
Cynet digital forensics tools Enterprise Security network security companies network security software Patch Management Software Penetration Testing software security vulnerability assessment

Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

satoshi
Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with—from conventional asset inventory
Breach and attack simulation. BAS solutions Cyber Attack cyber security data breach Endpoint Security Enterprise Security malware protection software

When Time is of the Essence – Testing Controls Against the Latest Threats Faster

satoshi
A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you’re protected right now. What do you do? Traditionally,
DRAM Chip DRAM Vulnerability Hacking News memory bit flipping RAM hacking RAMBleed RowHammer Attack Vulnerability

RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory

satoshi
A team of cybersecurity researchers yesterday revealed details of a new side-channel attack on dynamic random-access memory (DRAM) that could allow malicious programs installed on
cyber security Microsoft Microsoft Patch Tuesday windows updates windows Vulnerability

Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities

satoshi
After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows
adobe ADOBE ColdFusion Adobe Flash Player arbitrary code execution patch Tuesday Security patch Update software patch Vulnerability

Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign Software

satoshi
It’s Patch Tuesday week! Adobe has just released the latest June 2019 software updates to address a total 11 security vulnerabilities in its three widely-used
cyber security Hacking News hacking wordpress WordPress wordpress plugin Wordpress plugin vulnerability WordPress Vulnerability

New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions

satoshi
Security researchers have been warning about a critical vulnerability they discovered in one of a popular WordPress Live Chat plugin, which, if exploited, could allow
cyber security hacking linux Linux hacking Linux security Linux Vulnerability Vim vim editor Vulnerability

Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

satoshi
Linux users, beware! If you haven’t recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the
Botnet brute force attack Hacking News RDP server hacking Windows RDP Server windows security

New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide

satoshi
Security researchers have discovered an ongoing sophisticated botnet campaign that is currently brute-forcing more than 1.5 million publicly accessible Windows RDP servers on the Internet.
Hacking News privilege escalation windows privilege escalation Windows zero-day vulnerability zero day exploit

Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw

satoshi
An anonymous security researcher going by the name of SandboxEscaper today publicly shared a second zero-day exploit that can be used to bypass a recently