Breaking News

Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket

Security researchers discovered that hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security experts…

8 years ago

Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread

A new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread. A…

8 years ago

Experts at ZDI reported two critical Zero-Day flaws in Foxit PDF Reader

Experts found two critical zero-day flaws in the Foxit PDF Reader that could be exploited by attackers to execute arbitrary…

8 years ago

Ourmine hacked PlayStation Social Media Accounts to announce the theft of PSN Database

Ourmine hacker crew hijacked the official Twitter and Facebook accounts for Sony PlayStation Network (PSN) on Sunday and claims to…

8 years ago

Mr.Smith, HBO hackers threaten to leak final episode of Game of Thrones 7

The bad actors behind the HBO hack are back and are threatening to leak the final episode of the seventh…

8 years ago

Enigma platform hacked, hackers stole over $470,000 worth of Ethereum

Enigma platform hacked - Another cyber heist made the headlines, this time an unknown hacker has stolen more than $471,000…

8 years ago

New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and…

8 years ago

SyncCrypt Ransomware hides its components in image files

A new strain of ransomware distributed through spam emails, dubbed SyncCrypt, hides its components inside harmless-looking images. A new strain of ransomware recently discovered, dubbed SyncCrypt, hides its…

8 years ago

Security Affairs newsletter Round 124 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Anti-Israel…

8 years ago

Learning About ISIS Intentions Using Open Source Intelligence

Learning About ISIS Intentions Using Open Source Intelligence - How terrorists are exploiting technology for propaganda and radicalization. ISIS' weekly newsletter…

8 years ago

This website uses cookies.