Shellshock: A Collection of Exploits seen in the wild
Ever since the shellshock vulnerability has been announced, we have seen a large number of scans probing it. Here is a quick review of exploits that our honeypots and live servers…
Ever since the shellshock vulnerability has been announced, we have seen a large number of scans probing it. Here is a quick review of exploits that our honeypots and live servers…
Tails, a Linux-based highly secure Operating System specially designed and optimized to preserve users' anonymity and privacy, has launched its new release, Tails version 1.1.2.
Jaime Blasco at AlienVault Labs explained that ShellShock vulnerability could be exploited to hack Voice over IP systems worldwide.
Qmail can be used as an attack vector to exploit bash vulnerable to CVE-2014-6271 (aka shellshock). This can be used to execute arbitrary commands as any valid user with a .qmail…
New malware kit dubbed Spike was used by bad actors to run DDoS attacks through routers, smart thermostats, smart dryers and other devices to the Internet of Things category.