Breaking News

32TB of Windows 10 internal builds and portions of core source code leaked online

A massive dump of Microsoft's confidential Windows 10 internal builds, and the source codes for private software has been leaked…

9 years ago

US intelligence claims Russian hackers probed electoral networks in 21 US states

According to the US intelligence, Russian hackers tried to compromise electoral networks in 21 unnamed US states, but voting tallies…

9 years ago

UK politicians’ login credentials up for sale in the dark web

Russians hackers are offering for sale on the dark web login credentials of thousands of top UK politicians, top officials,…

9 years ago

Experts devised the GhostHook Attack technique to bypass Windows 10 PatchGuard Protections

Experts have devised the GhostHook Attack technique to install rootkits on machines running the Windows 10 operating system. Security flaws…

9 years ago

Two men suspected of being part of international plot to hack Microsoft networks

British Police arrested two men suspected of being members of a large organization than plans to hack Microsoft Networks. Investigators…

9 years ago

OpenVPN fixed several remotely exploitable flaws that were not detected by recent audits

OpenVPN fixed several vulnerabilities that could be exploited by remote attackers, the flaws were not detected in a recent audit.…

9 years ago

Drupal fixes the CVE-2017-6922 flaw exploited in spam campaigns in the wild

Drupal team released security updates to fix several vulnerabilities, including the critical access bypass flaw CVE-2017-6922 exploited in spam campaigns.…

9 years ago

Brutal Kangaroo is the CIA tool suite for hacking Air-Gapped Networks

WikiLeaks has published a new batch of Wikileaks documents that detail the Brutal Kangaroo tool suite for hacking Air-Gapped Networks.…

9 years ago

Honda halted production in a factory after finding WannaCry traces in its networks

The Honda company shuts down a factory in Japan after finding the WannaCry ransomware in its networks after 5 weeks…

9 years ago

Attackers can exploit electronic cigarettes to hack computers

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In…

9 years ago

This website uses cookies.