ThreatRavens
  • THREATS
    • DDoS Attacks
    • Malware
    • Phishing
    • Ransomware
    • Trojan/ Worms
  • About Us
  • Contact Us
arbitrary code execution

Cisco Released Patches for More than 30 Vulnerabilities Including the 5 Critical One’s in FXOS and NX-OS

  • dev_threatravens
  • June 22, 2018
  • 0

Cisco released patches for 34 vulnerabilities affecting multiple products that include 5 critical vulnerabilities, 20 High severity vulnerabilities and 9 medium level vulnerabilities. Critical Vulnerabilities Cisco patched 5 critical Vulnerabilities…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
DDOS

Pulse Wave Heavy DDoS Attack to Take Down Multiple Protected Target Networks

  • dev_threatravens
  • June 22, 2018
  • 1

A new method of DDOS attack called Pulse wave emerging as a nightmare for DDOS protection solutions. With this method, attackers can bring down systems that previously thought to be…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Android

FakeSpy – Android Information Stealing Malware Attack to Steal Text Messages, Call Records & Contacts

  • dev_threatravens
  • June 22, 2018
  • 0

Cyber criminals spreading new Android Malware called FakeSpy to compromise the infected Android users to stealing text messages, account information, contacts, and call records. FakeSpy using SMS as an entry…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Artificial Intelligence & the Security Market

  • dev_threatravens
  • June 22, 2018
  • 1

A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs.

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Information Gathering

SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool

  • dev_threatravens
  • June 22, 2018
  • 0

Sn1per is an automated scanner that can automate the process of collecting data for the exploration and penetration testing. In their work sn1per involves such well-known tools like: amap, arachni,…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Click2Gov Breaches Attributed to WebLogic Application Flaw

  • dev_threatravens
  • June 22, 2018
  • 1

At least 10 US cities running Click2Gov software have alerted citizens to a data breach, but it turns out the problem was in the application server.

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Better Biometrics in Android P

  • ThreatRavens
  • June 22, 2018
  • 4

Posted by Vishwath Mohan, Security Engineer [Cross-posted from the Android Developers Blog] To keep users safe, most apps and devices have an authentication mechanism, or a way to prove that…

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Templates: The Most Powerful (And Underrated) Infrastructure Security Tool

  • dev_threatravens
  • June 22, 2018
  • 1

If your team is manually building cloud instances and networks for every application, you’re setting yourself up for a data breach.

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Android

Don’t download it! Fake Fortnite app ends in malware…

  • dev_threatravens
  • June 21, 2018
  • 1

Epic Games is on the verge of releasing Fortnite for Android – so the crooks are jumping in to offer you “early access”… to malware!

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail
Security News

Microsoft Office: The Go-To Platform for Zero-Day Exploits

  • dev_threatravens
  • June 21, 2018
  • 1

Malicious Office documents are the weapon of choice among cybercriminals, who use files to access remotely hosted malicious components.

Read More
  • Share

    • Twitter
    • Linkedin
    • Facebook
    • Mail

Posts navigation

Prev 1 … 1,978 1,979 1,980 … 1,989 Next

Subscribe to Our Newsletter

About Us

As cyber attacks grow more complicated and targeted, organizations should take every possible opportunity to learn more about the potential attacks being targeted against them. ThreatRavens helps you keep your security and incident response teams updated about latest happenings in Cyber Security space.

Stay Connected

Latest Posts

  • The SolarWinds Body Count Now Includes NASA and the FAA
    February 27, 2021
  • The Week in Ransomware – February 26th 2021 – Back from the Holidays
    February 27, 2021
  • Amazon Dismisses Claims Alexa ‘Skills’ Can Bypass Security Vetting Process
    February 27, 2021

Advertisement

About Us

ThreatRavens Logo - Dark

ThreatRavens brings you latest cyber security news, updates, vulnerability disclosure bulletins, malware analysis reports and latest happenings in security space.

Our Recent Tweets

  • Drovorub Linux Rootkit IOCs https://t.co/LtOgCVDFPF Drovorub Linux Rootkit IOCs captured by IOC pivoting using Viru… https://t.co/beEbBv8dlN191 days ago
  • The Unattributable “db8151dd” Data Breach https://t.co/j8vEWEfqgN286 days ago
  • We're moving few things around at https://t.co/lr0XxO7xRe Coming up with a new look and some exciting features. St… https://t.co/lZzfaG9x5Z289 days ago

Browse Tags

APT28 CISA Cyber Career Forum Cyber Security Cyber Threat Intelligence Data Breach Data Theft Drovorub Linux Rootkit Fancy Bear Indicators of Compromise Information Security InfoSec Malware Analysis NSA Advisory Phishing Ransomware Russian APT Security Intelligence Security Learning Threat Research US-CERT

Subscribe to Newsletter

  • Facebook
  • Twitter
  • RSS
2020 ThreatRavens. All Rights Reserved.
We use cookies to offer you a better browsing experience, analyze site traffic and show personalize content. Read about how we use cookies and how you can control them by clicking "Cookie Policy". If you continue to use this site, you consent to our use of cookies." Cookie Policy