Breaking News

Operation Ke3chang, alleged Chinese hackers target Indian Embassies Worldwide

Security experts from PaloAlto Networks collected evidence that the Operation Ke3chang discovered by FireEye in 2013 is still ongoing. Back…

10 years ago

Magnitude EK authors are integrating exploit code for CVE-2016-4117 Adobe flaw

The authors of the Magnitude exploit kit are integrating the exploit code for the CVE-2016-411 Adobe Flash Player vulnerability. Recently…

10 years ago

Criminals steal $13m in three hours from ATMs across Japan

Japanese police are investigating coordinated raids across stores in Japan that resulted in the theft of $13m from ATMs in…

10 years ago

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence.…

10 years ago

Journalists get scammed trying to buy an AK47 in the Dark Web

Producers from the German broadcaster ARD have conducted an interesting experiment to demonstrate how to buy a weapon on the…

10 years ago

Microsoft warns of malicious macros using a new sneaky trick

Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a…

10 years ago

Security Affairs newsletter Round 61 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

10 years ago

A dangerous Worm is infected outdated Ubiquiti Devices worldwide

A worm is infecting routers and other wireless devices across the world made by the Ubiquiti Networks company. An insidious…

10 years ago

Audio fingerprinting being used to track Internet users

A study of online trackers carried out by researchers at Princeton University allowed the identification of the Audio fingerprinting tracking…

10 years ago

It was too easy to hack Instagram Account Credentials

A researcher received a $5,000 bounty after finding two flaws that could have allowed attackers to run brute-force attacks on…

10 years ago

This website uses cookies.