Hacking

Russia’s FSB blames the US intelligence for Operation Triangulation

Russia’s intelligence Federal Security Service (FSB) said that the recent attacks against iPhones with a zero-click iOS exploit as part…

2 years ago

Apps with over 420 Million downloads from Google Play unveil the discovery of SpinOk spyware

Researchers discovered spyware, dubbed SpinOk, hidden in 101 Android apps with over 400 million downloads in Google Play. The malicious…

2 years ago

BlackCat claims the hack of the Casepoint legal technology platform used by US agencies

The BlackCat ransomware gang claims to have hacked the Casepoint legal technology platform used US agencies, including SEC and FBI.…

2 years ago

Widespread exploitation by botnet operators of Zyxel firewall flaw

Threat actors are actively exploiting a command injection flaw, tracked as CVE-2023-28771, in Zyxel firewalls to install malware. Threat actors…

2 years ago

Experts warn of backdoor-like behavior within Gigabyte systems

Researchers discovered a suspected backdoor-like behavior within Gigabyte systems that exposes devices to compromise. Researchers from firmware security firm Eclypsium…

2 years ago

Threat actors are exploiting Barracuda Email Security Gateway bug since October 2022

Recently disclosed zero-day flaw in Barracusa Email Security Gateway (ESG) appliances had been actively exploited by attackers since October 2022.…

2 years ago

Microsoft found a new bug that allows bypassing SIP root restrictions in macOS

Apple fixed a vulnerability discovered by Microsoft researchers that lets attackers with root privileges bypass System Integrity Protection (SIP). Researchers…

2 years ago

A database containing 478,000 RaidForums members leaked online

The database of the popular RaidForums hacking forum has been leaked on a new hacking forum, 478,000 members exposed. A…

2 years ago

Beware of the new phishing technique “file archiver in the browser” that exploits zip domains

"file archiver in the browser" is a new phishing technique that can be exploited by phishers when victims visit a…

2 years ago

BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint

Researchers devised an attack technique, dubbed BrutePrint Attack, that allows brute-forcing fingerprints on smartphones to bypass authentication. Researchers have devised…

2 years ago

This website uses cookies.