Hacking

Hackers who breached Barts NHS Trust exploited a zero-day vulnerabilityHackers who breached Barts NHS Trust exploited a zero-day vulnerability

Hackers who breached Barts NHS Trust exploited a zero-day vulnerability

In January, a cyber attack breached some systems at Barts NHS Trust and forced them offline. Hackers exploited a zero-day…

9 years ago
Metasploit team released Metasploit Vulnerable Services EmulatorMetasploit team released Metasploit Vulnerable Services Emulator

Metasploit team released Metasploit Vulnerable Services Emulator

Rapid7 released the Metasploit Vulnerable Services Emulator, a new tool that can be used by IT experts to emulate vulnerable…

9 years ago
Exclusive: A criminal group using SSH TCP direct forward attack is also targeting Italian infrastructureExclusive: A criminal group using SSH TCP direct forward attack is also targeting Italian infrastructure

Exclusive: A criminal group using SSH TCP direct forward attack is also targeting Italian infrastructure

Exclusive: MalwareMustDie for Security Affairs released the list of the sites under attack. A criminal gang is using SSH TCP…

9 years ago
The US Vice President Mike Pence’s personal AOL account was hackedThe US Vice President Mike Pence’s personal AOL account was hacked

The US Vice President Mike Pence’s personal AOL account was hacked

The US Vice President Mike Pence's personal AOL account was hacked, once again politics were breached due to wrong security…

9 years ago
Cloudflare tries to downplay the impact of the Cloudbleed incidentCloudflare tries to downplay the impact of the Cloudbleed incident

Cloudflare tries to downplay the impact of the Cloudbleed incident

According to Cloudflare, an initial analysis conducted its experts reveals that no personal data was leaked due to the CloudBleed…

9 years ago
Trolling, Doxing & Cyberstalking: Cybercrime & The LawTrolling, Doxing & Cyberstalking: Cybercrime & The Law

Trolling, Doxing & Cyberstalking: Cybercrime & The Law

Trolling, Doxing & Cyberstalking: Cybercrime & The Law. Cybercrime is one of the greatest threats facing US with implications for…

9 years ago
Researchers spotted a hidden backdoor in Chinese IoT devices from the firm DblTekResearchers spotted a hidden backdoor in Chinese IoT devices from the firm DblTek

Researchers spotted a hidden backdoor in Chinese IoT devices from the firm DblTek

Security experts at Trustwave have discovered a hidden backdoor in Internet of Things devices manufactured by the Chinese firm DblTek.…

9 years ago
ReBreakCaptcha – How to breaking Google’s ReCaptcha v2 using Google’s APIsReBreakCaptcha – How to breaking Google’s ReCaptcha v2 using Google’s APIs

ReBreakCaptcha – How to breaking Google’s ReCaptcha v2 using Google’s APIs

The researcher East-Ee Security devised a proof of concept bypass of the Google’s reCaptcha V2 verification system dubbed ReBreakCaptcha. East-Ee…

9 years ago
Tor webmail provider Sigaint is unavailable at least since February 11Tor webmail provider Sigaint is unavailable at least since February 11

Tor webmail provider Sigaint is unavailable at least since February 11

Dark net webmail provider For the third consecutive week, the popular Tor web email service SIGAINT is unavailable and the…

9 years ago
SQLi flaw in the NextGEN Gallery plugin exposes at risk of hack more than 1 Million WordPress InstallsSQLi flaw in the NextGEN Gallery plugin exposes at risk of hack more than 1 Million WordPress Installs

SQLi flaw in the NextGEN Gallery plugin exposes at risk of hack more than 1 Million WordPress Installs

More than 1 million WordPress website are at risk due to a critical SQL injection vulnerability in the NextGEN Gallery…

9 years ago