![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110832/cisco-400x200.jpg)
Cisco starts publishing fixes for EXTRABACON exploit
Starting last Wednesday, Cisco has begun publishing fixes for the SNMP RCE flaw in the software of its Adaptive Security Appliances (ASA), which can be triggered through the …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194739/fire-400x200.jpg)
Leaked EXTRABACON exploit can work on newer Cisco ASA firewalls
EXTRABACON, one of the Equation Group exploits leaked by the Shadow Brokers, can be made to work on a wider range of Cisco Adaptive Security Appliance (ASA) firewalls than …
![Juniper Networks](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195617/juniper-400x200.jpg)
Implant leaked by Shadow Brokers targets Juniper’s NetScreen firewalls
Juniper Networks has become the latest company to acknowledge that one of the implants leaked by the Shadow Brokers targets some of their products. Cisco and Fortinet did the …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111125/data-400x200.jpeg)
Snowden documents definitely link Shadow Brokers’ leak to the NSA
Last week, Cisco and Fortinet confirmed that the exploits leaked by the Shadow Brokers and aimed at compromising their networking devices work as intended, but the origin of …
![Cisco network](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195215/cisco-network-400x200.jpg)
Cisco, Fortinet validate exploits leaked by the Shadow Brokers
Cisco and Fortinet have released security advisories confirming that some of the exploits leaked by the Shadow Brokers work as intended. The entity released the batch as proof …
![NSA](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194610/nsa-400x200.jpg)
Leaked hacking tools can be tied to NSA’s Equation Group
The batch of data released by the Shadow Brokers, an entity that claims to have hacked the Equation Group, contains attack tools that can be tied to the group. Equation Group …
![KeySniffer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111339/keysniffer-400x200.jpg)
Low-cost wireless keyboards open to keystroke sniffing and injection attacks
Bastille Networks researcher Marc Newlin has discovered a set of security vulnerabilities in low-cost wireless keyboards that could be exploited to collect all passwords, …
![WarFrame](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111354/warframe-400x200.jpg)
Warframe, Clash of Kings players’ info stolen after forum hacks
Two new website hack/ user data theft combos have been revealed last week, and the victims are players of popular mobile real time strategy game Clash of Kings and online …
![BMW ConnectedDrive](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111615/bmw-connected-400x200.jpg)
BMW ConnectedDrive flaws could be misused to tamper with car settings
Security researcher Benjamin Kunz Mejri has found two vulnerabilities in the BMW ConnectedDrive web portal/web application. About the vulnerabilities in BMW ConnectedDrive The …
![explode](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113434/explode-400x200.jpg)
Exploit for GNU wget RCE flaw revealed
Technical details about a serious vulnerability affecting all but the latest version of the GNU wget software have been released online, along with PoC exploit scenarios. …
![Symantec](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112435/symantec-400x200.jpg)
Symantec, Norton AV products are riddled with serious flaws
Google security researcher Tavis Ormandy has unearthed a slew of critical vulnerabilities, including many remote code execution flaws, in Symantec and Norton enterprise and …
![anonymous](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111837/anonymous-index-400x200.jpg)
Tor Project tests new tool for foiling deanonymization attacks
Upcoming hardened releases of the Tor Browser will use a new technique aimed at preventing deanonymization efforts by anyone who might want to mount them. Created by a group …
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play