Hacking

Operation WilySupply – Software remote update channel of the supply chain exploited as attack vector

Microsoft has recently uncovered an attack dubbed Operation WilySupply that leveraged the update mechanism of an unnamed software editing tool to compromise…

9 years ago

Fatboy Ransomware as a Service sets the ransom based on the victims’ location

Recently discovered Fatboy ransomware implements a dynamic method of setting the ransom amount based on the geographic location of the…

9 years ago

Cisco fixes a critical flaw in CISCO CVR100W Wireless-N VPN Small Business Routers

Cisco released a firmware update to fix a critical buffer overflow vulnerability in CISCO CVR100W Wireless-N VPN Small Business Routers.…

9 years ago

Netrepser Cyber espionage campaign compromised hundreds of Government organizations worldwide

Experts from Bitdefender have uncovered the Netrepser Cyber espionage campaign that compromised more than 500 Government organizations worldwide. Security experts…

9 years ago

WikiLeaks leaked documents that detail the Archimedes tool used by the CIA in MitM attacks

WikiLeaks has released a news batch of documents detailing the Archimedes tool, a MitM attack tool allegedly used by the…

9 years ago

The Snake APT Group is preparing its offensive against high-profile Mac users

According to experts from the Fox-IT firm, the notorious Russian Snake APT group is ready to target also Mac users…

9 years ago

Security researcher disclosed a WordPress Password Reset Vulnerability

A researcher reported a WordPress Password Reset vulnerability, tracked as CVE-2017-8295, and detailed it in a security advisory. On Wednesday,…

9 years ago

Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocol

The company O2-Telefonica in Germany has confirmed to Süddeutsche Zeitung agency that some of its customers suffered cyber heists exploiting…

9 years ago

NSA Cyber Weapons installed in High Profile Targets in Greece

The installation of monitoring software has been conducted either by NSA highly sophisticated hacking team or by hackers who leveraged…

9 years ago

New insidious Google Docs phishing scheme is rapidly spreading on the web

Don't click Google Docs link! A Google Docs phishing scheme is quickly spreading across the Internet targeting a large number…

9 years ago

This website uses cookies.