According to a report from a leaked memo by Variety, in response to the incident, HBO offered a reward of $250,000, a…
Trend Micro spotted a new espionage campaign that has been active for at least 2 months and that is targeting Russian-speaking…
A mysterious company is offering up to $250,000 for virtual machine (VM) hacks. The “secret” bug bounty program was announced by Bugcrowd.…
WikiLeaks has published another Vault 7 leak, revealing the CIA tool CouchPotato that allows operators to remotely spy on video…
Experts at Cylance noticed that the decoy document used in KONNI attacks is similar to the one used in recent campaigns of…
A team of experts showed that a simple sticker attached on a sign board can confuse any self-driving car and potentially…
The FBI used a NIT involving a specially crafted video file to unmask a sextortionist that via Tor was threatening…
Many times we have seen in movies hackers and spies breaking electronic locks with any kind of electrical equipment. Is…
The Irish electricity transmission system operator EirGrid was targeted by a state-sponsored actor, the hackers weren't discovered at least for…
The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure triggering flaws found…
This website uses cookies.