article thumbnail

OWASP discloses a data breach

Security Affairs

The incident impacted OWASP members from 2006 to around 2014 who provided their resumes as part of joining OWASP. “OWASP collected resumes as part of the early membership process, whereby members were required in the 2006 to 2014 era to show a connection to the OWASP community.

article thumbnail

Threat actors offer for sale data for 50 millions of Moscow drivers

Security Affairs

Stolen data spans from 2006 and 2019, local media outlets have confirmed their authenticity. “The cybercriminals put up for sale for $ 800 a database of 50 million lines with the data of drivers that were registered in Moscow and the Moscow region from 2006 to 2019.

Sales 283
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against SolarWinds Serv-U SW were possible due to the lack of ASLR mitigation

Security Affairs

SolarWinds did not enable anti-exploit mitigation available since 2006 allowing threat actors to target SolarWinds Serv-U FTP software in July attacks. Software vendor SolarWinds did not enable ASLR anti-exploit mitigation that was available since the launch of Windows Vista in 2006, allowing the attackers to launch targeted attacks in July.

Libraries 327
article thumbnail

'SinkClose' AMD CPU vulnerability explained: How dangerous is it really?

Collaboration 2.0

The flaw endangers essentially all - yes, all - AMD processors made since 2006, but it threatens servers, data centers, and clouds more than the PC in front of you. Here's what you need to know and what you can do about it.

IT 189
article thumbnail

MI5 seized Boris Johnson’s phone over security risk fears

Security Affairs

In April, media reported that Boris Johnson ‘s personal mobile phone number has been freely available on the internet for the past 15 years after it was published in a think tank press release in 2006, but never deleted. ” reported the DailyMail.

Risk 362
article thumbnail

The Role of Differential Privacy in Protecting Sensitive Information in the Era of Artificial Intelligence

Security Affairs

Cynthia Dwork (2006) introduced the fundamental idea, established its mathematical basis, and illustrated how privacy guarantees can be attained by adding numerical work. A cornerstone in privacy-preserving data analytics introduced the concept of differential privacy, its mathematical basis, and how adding noise ensures privacy.

article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. The malicious code employed in the attacks is the Hupigon RAT , a RAT previously spotted in campaigns carried out by China-linked APTs such as APT3 (aka TG-0100 , Buckeye , Gothic Panda , and UPS).

Phishing 333