Hacking

DoS attacks against most used default Tor bridges could be very cheapDoS attacks against most used default Tor bridges could be very cheap

DoS attacks against most used default Tor bridges could be very cheap

Researchers explained that carrying out attacks against the most used default Tor bridges would cost threat actors $17,000 per month.…

6 years ago
The Cost of Dealing With a Cybersecurity Attack in These 4 IndustriesThe Cost of Dealing With a Cybersecurity Attack in These 4 Industries

The Cost of Dealing With a Cybersecurity Attack in These 4 Industries

A cybersecurity issue can cause unexpected costs in several different areas, which is the cost of Dealing with an attack…

6 years ago
Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”

Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour”

Experts from Group-Ib that exposed the most recent campaigns carried out by Silence reported that damage from the APT group…

6 years ago
A backdoor mechanism found in tens of Ruby librariesA backdoor mechanism found in tens of Ruby libraries

A backdoor mechanism found in tens of Ruby libraries

Maintainers of the RubyGems package repository have removed 18 malicious versions of 11 Ruby libraries that contained a backdoor. Maintainers…

6 years ago
Flaw in New Facebook Design Allowed Removal of Profile PhotosFlaw in New Facebook Design Allowed Removal of Profile Photos

Flaw in New Facebook Design Allowed Removal of Profile Photos

A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the…

6 years ago
5 Ways to Protect Yourself from IP Address Hacking5 Ways to Protect Yourself from IP Address Hacking

5 Ways to Protect Yourself from IP Address Hacking

Your IP address represents your digital identity online, hacking it not only allows attackers to access your device or your…

6 years ago
Backdoored Webmin versions were available for download for over a yearBackdoored Webmin versions were available for download for over a year

Backdoored Webmin versions were available for download for over a year

Webmin, the popular open-source web-based interface for Unix admin contained a remote code execution vulnerability for more than a year.…

6 years ago
Hacker publicly releases Jailbreak for iOS version 12.4Hacker publicly releases Jailbreak for iOS version 12.4

Hacker publicly releases Jailbreak for iOS version 12.4

Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers. A public Jailbreak…

6 years ago
5 Common Phishing Attacks and How to Avoid Them?5 Common Phishing Attacks and How to Avoid Them?

5 Common Phishing Attacks and How to Avoid Them?

Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering…

6 years ago
At least 23 Texas local governments targeted by coordinated ransomware attacksAt least 23 Texas local governments targeted by coordinated ransomware attacks

At least 23 Texas local governments targeted by coordinated ransomware attacks

At least 23 local governments were impacted by a wave of ransomware attacks that according to the experts are the…

6 years ago