Hacking

Coronavirus-themed attacks February 1 – March 15, 2020

In this post, I decided to share the details of the Coronavirus-themed attacks launched from February 1 to March 15,…

6 years ago

Massive cyber attack hit the town hall of Marseille ahead local election

While the Coronavirus is spreading worldwide, a massive cyber attack hit the town hall of Marseille and the metropolis. Ahead…

6 years ago

Slack bugs allowed take over victims’ accounts

Slack addressed a critical flaw within 24 hours from its disclosure, the issue allowed attackers to carry out automate account…

6 years ago

One of the major COVID-19 testing laboratories in Czech hit by cyberattack

A cyber attack hit one of the major COVID-19 testing laboratories in Czech, the Brno University Hospital in the city…

6 years ago

State-sponsored hackers are launching Coronavirus-themed attacks

In the last weeks, security experts reported many Coronavirus-themed attacks carried out by cybercrime gangs, now experts warn of similar…

6 years ago

Flaws in the Popup Builder WordPress plugin expose 100K+ websites to hack

Flaws in the Popup Builder WordPress plugin could allow unauthenticated attackers to inject malicious JavaScript code into popups of 100K+…

6 years ago

Russia-Linked Turla APT uses new malware in watering hole attacks

The Russia-linked APT group Turla employed two new pieces of malware in attacks launched over a period of roughly two…

6 years ago

Card data stole from the Volusion security breach surfaces on the dark web

Security experts have discovered that card data stolen last year from Volusion-hosted online stores is now available for sale on…

6 years ago

Experts disclose tens of flaws in Zyxel Cloud CNM SecuManager, includes dangerous backdoors

Flaws Riddle Zyxel’s Network Management Software Experts have found tens of security vulnerabilities in Zyxel Network Management Software, including backdoors…

6 years ago

Hacking a network, using an ‘invisibility cloak’ – Is it that simple?

Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to hack into…

6 years ago

This website uses cookies.