Search Results

Hetzner technicians discovered a backdoor in one of our computer system. Information security experts recommend that users change their password immediately. Evening of June 6 German hosting company Hetzner has sent a letter to its customers with a notice of the incident safety. The notification host representatives reported that information security experts found a backdoor […]

The Most Sophisticated Apache Backdoor Manufacturer antivirus software Eset detected malicious campaign on the internet that uses a backdoor for the popular Apache web servers, aiming to redirect users to a malicious site with a set of exploits for the platform BlackBerry. In Eset say they have found a malicious campaign on Friday and over […]

Vulnerability: Backdoor in TP-Link devices Danger level: Avarage Patch: None Number of vulnerabilities: 1 Vector of operation: Local Network Impact: System Compromise Be exploited: PoC code Affected products:  TL-WR743ND, TL-DR4300. Affected versions:  TL-WDR4300, TL-WR743ND (v1.2 v2.0).

The SEC Consult company found undocumented accounts in solutions of Barracuda Networks. According to SEC Consult, in different software company Barracuda Networks was discovered backdoor. The notice referred to the existence of undocumented accounts, remote which can be accessed remotely via SSH. Undocumented accounts associated with the “backend support mechanisms.” Support page for the manufacturer […]

Antivirus company Trend Micro has detected a new type of malicious software that masquerades as a patch for the environment Java, allegedly eliminating vulnerabilities in this latest development. Recall that Oracle over the past 7 days did release an update for Java 7 that addresses one of the critical dangerous vulnerabilities, but independent security experts […]

Trojan bot infects computers running Windows. At infection of system places the copy in the catalog % APPDATA% \ {GUID} \ and modifies the registry branch SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ Run in order to implement its own autorun at system startup. Built into all business processes and […]

Antivirus company Trend Micro today announced the discovery of a new class of malicious software backdoor aimed at infection HTTP-server implemented to work with Java. Code allows attackers to execute malicious commands directed to the system in which the server is running. Threat, known as BKDR_JAVAWAR.JG, implemented as JSP (Java Server Page), that allows you […]

Backdoor allowed hackers to gain administrative access to the SCADA-systems, owning only the IP-address of the device. Industrial Company of New Jersey, USA, was the victim of hackers who broke into its automated control system (Industrial control system, ICS). Hackers gained access to the system through the backdoor, which was introduced by producer ICS. According […]

According to the developers, the malicious code has been available for download for 8 hours. Unknown hackers managed to introduce a backdoor in the source code of the latest version of the popular web-analytics open source Piwik, pre-cracking official web-site of the project (http://piwik.org/). About this report the program developers. Piwik is used to track […]

According to experts of the incident affects products Samsung and Dell. As found in information security expert Neil Smith, a number of printer models, manufactured by Samsung, with a built a program that allows the manufacturer to support service to remotely connect to the device and to manage its settings, as well as diagnostics. This […]