SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
The Israel Defense Forces (IDF) stated that The Palestinian militant organization, Hamas, schemed to coax Israeli Soldiers into installing spyware and malicious apps using young women profiles on social media platforms such as Instagram, telegram and Facebook. According to the IDF spokesman Brigadier General Hild Silberman, many of the characters posed as new Israeli immigrants…
The IOTA foundation shut down their cryptocurrency, IOTA, after cybercriminals attacked and stole user funds. The attack happened on February 12, 2020; the Foundation notified users on Twitter not to open or use their wallet app, Trinity, on Desktop. After the initial investigation, the foundation turned off a node known as “coordinator” which approves IOTA…
A team of researchers from Singapore has published a paper detailing a collection of vulnerabilities they discovered in Bluetooth chips from several different vendors. The vulnerabilities named SweynTooth impact devices running the Bluetooth Low Energy (BLE) protocol. They can be used by an attacker in Bluetooth range can crash affected devices, force a reboot by sending them…
Huawei, some subsidiaries and its CFO are accused of 16 charges including espionage, theft of intellectual property and conspiring to steal secrets from US companies by The US Department of Justice. In addition to the charges filed in January 2019 including bank fraud and violating sanctions, US has now charged the tech giant with 16…
Google found over 500 chrome extensions they found to inject malicious ads and siphon off user browsing data to servers under the control of attackers. These extensions have been downloaded millions of times from Google’s Chrome Web Store secretly uploaded private browsing data to attacker-controlled servers. Browser extensions are used for customizing web browsers, modifying…
Cyber security company, Malwarebytes published the result of a 1 – year data analysis in its latest State of Malware report. According to Malwarebytes, “Mac threats growing faster than their Windows counterparts for the first time ever, with nearly twice as many Mac threats detected per endpoint as Windows threats.” Malwarebytes report also clarified the…
Online music platform SoundCloud has fixed several security vulnerabilities affecting its API that could have otherwise resulted in hackers taking over accounts, launching denial of service attacks(DoS), and exploiting the service. Checkmarx Security Research team found the flaws in an investigation aiming to study the state of API security in leading online platforms. According to…
Android-användare har blivit måltavla för en fishing-attack som kommer att sprida Anubis banks Trojan över användarnas enheter. Denna skadliga programvara kan attackera mer än 250 shopping- och bankrelaterade appar och stjäla användarnas ekonomiska information. I denna operation används en dubbel strategi för att råda möjliga offer för att installera skadlig programvara. Strategin är att be…
Microsoft has released an update to patch 99 vulnerabilities on Windows and other Microsoft software. This includes 12 vulnerabilities flagged as Critical and 87 flagged as Important. The update includes a patch for the zero-day memory-corruption vulnerability disclosed in late January that’s under active attack. The bug tracked as CVE-2020-0674 is a critical flaw for most Internet Explorer versions,…
FBI stated in a security alert sent to private sectors in U.S. that an ongoing campaign is aiming their supply chain software providers; the campaign which is conducted by Orangeworm hacking group, is seeking to penetrate companies with the Kwampirs malware, a remote administration Trojan (RAT). However the identity of the compromised companies were not…