Breaking News

Alleged Russian operation has compromised a laptop at a Vermont utility

The code associated with Russian hacking operation dubbed Grizzly Steppe by the Obama administration infected a laptop at a Vermont…

9 years ago

#OpSingleGateway – Gh0s7 hacked Thai Government website in response to the recent arrests

#OpSingleGateway - The hacker Gh0s7 hacked the Thailand's National Statistical Office (http://nso.go.th) in response to the recent arrests operated by…

9 years ago

FBI-DHS JAR report links Russian hackers to Presidential Election hacks

A FBI-DHS JAR report released implicated Russian hacking group APT28 and APT29 in attacks against 2016 Presidential Election. The Department…

9 years ago

In 2017: Cool New Tech, Ominous Cyber Threats & Increased Terrorism in the West

A lot of new and exciting technology will emerge or become more prominent in 2017 and the following is just…

9 years ago

Sundown Exploit Kit now leverages on the steganography

A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security…

9 years ago

CheckPoint experts spotted Three Critical 0-Day in PHP 7

Researchers at the security firm CheckPoint have discovered three fresh critical zero day vulnerability in the last PHP 7. Security…

9 years ago

President Obama executive order ejected 35 Russians out of US

An executive order issued by President Obama applies sanctions on Russian military and intelligence officials. 35 Russian operatives were ejected.…

9 years ago

Hacker Interview @Firox_ – Security Affairs

Today I have the pleasure to interview @Firox_, one of the most intriguing characters of the hacking community. You are…

9 years ago

The OSCE organization was victim of a major cyber attack

The Organization for Security and Co-operation in Europe (OSCE) confirmed to have suffered suffer a "major" cyber attack. Hackers targeted…

9 years ago

Researcher found a severe flaw in the MONyog monitoring tool

A security expert discovered a vulnerability in the MONyog tool that could be exploited by a normal user to elevate…

9 years ago

This website uses cookies.