Hacking

This bug can permanently break iPhone WiFi connectivity

A new bug in iPhone can permanently break users' WiFi by disabling it, the issue could be triggered by simply…

5 years ago

North Korean APT group Kimsuky allegedly hacked South Korea’s atomic research agency KAERI

North Korea-linked APT group Kimsuky allegedly breached South Korea’s atomic research agency KAERI by exploiting a VPN vulnerability. South Korean…

5 years ago

RedFoxtrot operations linked to China’s PLA Unit 69010 due to bad opsec

Experts attribute a series of cyber-espionage campaigns dating back to 2014, and focused on gathering military intelligence, to China-linked Unit…

5 years ago

Ferocious Kitten APT targets Telegram and Psiphon VPN users in Iran

Iran-linked Ferocious Kitten APT group used instant messaging apps and VPN software like Telegram and Psiphon to deliver Windows RAT…

5 years ago

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV…

5 years ago

Poland institutions and individuals targeted by an unprecedented series of cyber attacks

Poland 's government announced that it was targeted by an 'Unprecedented' series of cyber attacks, hackers hit against institutions and…

5 years ago

A flaw in Peloton Bike+ could allow hackers to control it

A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry…

5 years ago

Instagram flaw allowed to see private, archived Posts/Stories of users without following them

Instagram has addressed a new flaw that allowed anyone to access private accounts viewing archived posts and stories without having…

5 years ago

Wear your MASQ! New Device Fingerprint Spoofing Tool Available in Dark Web

The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The…

5 years ago

Microsoft experts disrupted a large-scale BEC campaign

Microsoft disrupted a large-scale business email compromise (BEC) campaign that used forwarding rules to access messages related to financial transactions.…

5 years ago

This website uses cookies.