http://mhkmuseum.edmun-mhk.go.th/bordo.htm
http://mhkmuseum.edmun-mhk.go.th/bordo.htm defaced by 1923Turk
Tags: bordo-htm-defacedhttp://mhkmuseum.edmun-mhk.go.th/bordo.htm defaced by 1923Turk
Tags: bordo-htm-defacedhttp://www.mahasarakham.go.th/mkpoll defaced by Ashiyane Digital Security Team
Tags: mkpoll-defaced, Security, security-teamhttp://www.lampang.go.th/webb/ash.html defaced by Ashiyane Digital Security Team
Tags: ash-html-defaced, ashiyane, ashiyane-digital, Security, security-teamhttp://www.ago.go.th/123.php defaced by By_aGReSiF
Tags: 123-php-defacedNothing's anonymous in a WikiLeak world Technology Spectator The two most prominent examples, of course, are the cases of the collective Anonymous releasing more than 10 gigabytes of data from local sheriffs' departments last week and WikiLeaks , specifically Julian Assange's publication of more than 250000 US …
Tags: collective, hacker, local-sheriffs, the-collective, wikileakZero Day Initiative Advisory 11-259 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles corrupt Sample Size atoms
Tags: atom, exploit, VulnerabilityZero Day Initiative Advisory 11-258 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.
Tags: atom, sample, VulnerabilityZero Day Initiative Advisory 11-257 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple’s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie
Tags: Apple, Application, exploit, the-applicationhttp://www.ska1.go.th/pr/view.php?article_id=25 defaced by Ashiyane Digital Security Team
Tags: ashiyane, ashiyane-digital, Security, security-teamZero Day Initiative Advisory 11-256 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Tags: Apple, Browser, exploit, media