A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Dark marketplaces raked from $300,000 to $500,000 a day How to hack a Parrot drone on the fly How BitTorrent could let lone DDoS attackers bring down big sites […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. ZigBee-sniffing drone used to map online Internet of Things RollJam, a $30 device to unlock the majority of car doors Tesla tech top dog downs slug of Scotch, increases […]
A senior U.S. intelligence official revealed that Chinese hackers have accessed the private emails of “many” top Obama administration officials. According to an official of the US intelligence, Chinese hackers have accessed the private emails of “many” top members of the Obama administration. The news was reported by the NBC News which obtained a top […]
NBC News reported Russian hackers have compromised computers at the Pentagon, an unclassified email system has been shut down in response of the attack. According to the NBC news, US officials have reported that Russia launched a “sophisticated cyberattack” against the Pentagon’s Joint Staff unclassified email system. The unclassified email system has been shut down […]
The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from victims. An alleged Chinese APT group dubbed Panda Emissary (also known as TG-3390) is targeting high-profile governments and organisations searching for defense aerospace projects. Researchers at Dell discovered that the Panda Emissary group used Watering hole […]
A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking platform. According RSA Security, a China-based virtual private network (VPN) service provider offers hacking crews a network of compromised servers which can be used to carry out stealth cyber attacks. The attacks appear to be […]
The NBC News published a secret NSA map reporting the locations of “Victims of Chinese Cyber Espionage” attacks that resulted in data thefts. The NBC News has published in exclusive a secret NSA map showing the locations of the cyber attacks carried out by Chinese hackers over a five-year period. Every marker in the secret NSA map […]
The US will strike back China in response to the recent wave of cyber attacks against Government offices, including the Office of Personnel Management. Recently, the New York Times published an article saying that the president of the United States, Barack Obama took the decision to retaliate against China, after the famous hack of the […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. HORNET, the High-Speed Tor-Like encrypted anonymous network Anonymous’s team GhostSec thwarts Isis terror plots Drone Firing Semi-Automatic Handgun, what’s next? Advertising hijacking made by Invisible rogue mobile apps are […]
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]