Hacking

Industrial Products of many vendors still vulnerable to KRACK attack

Many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). Many industrial…

8 years ago

Hashcat 4.0.0 now can crack passwords and salts up to length 256

The new version of the tool, Hashcat 4.0.0 release is now available and includes the support to crack passwords and…

8 years ago

Mysterious hack allows attackers stealing Windows login credentials without user interaction

Microsoft fixed a vulnerability that could allow hackers to steal Windows login credentials without any user interaction. Microsoft fixed a…

8 years ago

Bad Rabbit Ransomware leverages the NSA Exploit for lateral movements

Malware researchers at Cisco Talos team discovered the Bad Rabbit Ransomware leverages EternalRomance to propagate in the network. New precious…

8 years ago

Microsoft releases the open-source scanning tool Sonar

Microsoft announced the availability of Sonar, an open source linting and website scanning tool that was developed by the Microsoft Edge…

8 years ago

Hackers broke into the celeb London Bridge Plastic Surgery clinic

The celeb London Bridge Plastic Surgery clinic confirmed in a statement that it has been the victim of a cyber…

8 years ago

Krebs reported that Dell lost Control of dellbackupandrecoverycloudstorage Domain in June 2017

The popular investigator Brian Krebs reported that the tech giant Dell lost the control of dellbackupandrecoverycloudstorage domain in June 2017.…

8 years ago

Kaspersky: Hackers used backdoored MS Office key-gen to steal NSA exploits

According to Kaspersky, the PC was hacked after the NSA employee installed a backdoored key generator for a pirated copy…

8 years ago

Offshore Legal Firm Appleby Hacked, financial details of rich clients is set to be released

The Financial details of some of the world's richest people are set to be published after the Offshore Legal Firm Appleby…

8 years ago

DUHK Attack allows attackers recover encryption keys used to secure VPN connections and web browsing sessions

DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions…

8 years ago

This website uses cookies.