Kenya opposition claims hackers have manipulated the results of the recent election by breaking into the database of Kenya's electoral commission. According…
Crosstalk Leakage Attacks - Experts demonstrated that USB gadgets can secretly spy on data flowing in and out of devices…
University of Washington scientists have created an experiment that shows how DNA can be used to not only create biologic…
According to a report from a leaked memo by Variety, in response to the incident, HBO offered a reward of $250,000, a…
According to FireEye, the notorious Russia-linked APT28 group is behind an ongoing campaign targeting hotels in several European countries. According…
The Cyber Police of Ukraine arrested a Ukraine man that allegedly distributed the NotPetya/ExPetr malware resulting in the infection of…
Trend Micro spotted a new espionage campaign that has been active for at least 2 months and that is targeting Russian-speaking…
A mysterious company is offering up to $250,000 for virtual machine (VM) hacks. The “secret” bug bounty program was announced by Bugcrowd.…
WikiLeaks has published another Vault 7 leak, revealing the CIA tool CouchPotato that allows operators to remotely spy on video…
Experts at Cylance noticed that the decoy document used in KONNI attacks is similar to the one used in recent campaigns of…
This website uses cookies.