Zcash (ZEC) is a new cryptocurrency that promises a total anonymity, it is already attracting a great interest from miners…
A PricewaterhouseCoopers SAP software, the Automated Controls Evaluator (ACE), is affected by a critical security flaw that could be exploited…
Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple…
The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers…
Georgia's secretary of state, Brian Kemp, revealed that voter registration database was targeted by hackers with IP address linked to…
Waiting for security patches, the CERT/CC suggests to stop using Netgear R7000 and R6400 routers to avoid being hacked. Other…
According to the German Intelligence, the APT 28 group, also known as Fancy Bear, is ramping up information warfare against Germany…
Experts at the Nuclear Industry Summit (NIT) explained how to reduce the risk of damaging cyberattacks at nuclear facilities. The…
A Turkish hacker is advertising into the hacking underground a new DDoS platform, dubbed Surface Defense (Translation to English). According…
Enjoy the interview with Gabriel Bergel (@gbergel), one of the most talented hackers in the wild. Gabriel is an Infosec…
This website uses cookies.