Skip to content

The Insecurity Matters Blog

Welcome!

  • Home
  • Downloads
  • GIMPS
  • Hash Sets
  • Privacy Policy
Ensurtec.com ยป exploit
    • Downloads
    • Famy’s Weird Fornite Thingy
    • GIMPS
    • Hash Sets
    • Privacy Policy

Tag: exploit

Monero mining botnet is making a fortune

monero mining botnet
Proofpoint has been tracking a botnet that mines a cryptocurrency called Monero. What makes Monero attractive for attackers is that it’s a private digital currency that is advertised as secure, private, and untraceable. Bitcoin has been dropping in value while Ethereum and Monero have gained value, and Bitcoin doesn’t have complete anonymity making it less... Continue reading Monero mining botnet is making a fortune

Web Trackers Exploit Your Browser Credential Manager

Web Trackers Exploit Browser
Browsers give you the option of auto-filling your username and password as a convenience, but convenience usually comes with vulnerability in the cyber world, and this is no exception. There are two scripts used by over one thousand websites to steal your email address and other user identifiers to send to third-party servers to track... Continue reading Web Trackers Exploit Your Browser Credential Manager

Antivirus Bug Can Be Used to Attack You

antivirus bug
A new antivirus bug called AVGater was discovered by a Vienna, Austria researcher named Florian Bogner. The bug can be exploited by local users only and allows the attacker to have full control over the computer by misusing the restore from quarantine in antivirus. The three access areas of antivirus are the unprivileged domain that... Continue reading Antivirus Bug Can Be Used to Attack You
Tags
anonymous antivirus best practices chrome computer configuration continuous monitoring cpu credentials cybersecurity dark web data breach deep web dvwa email encryption exploit fcc google government hacker hackers hard drive information security installation IT keylogger linux malicious malware net neutrality password privacy ransomware remote desktop scripting security security onion shodan social engineering social media twitter vpn vulnerability websites
Powered by WordPress | Theme Unax
The Insecurity Matters Blog