Hacking

CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wildCVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild

CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild

CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited to launch malware-based attacks in the…

9 years ago
Researchers hack WhatsApp accounts through SS7 protocolResearchers hack WhatsApp accounts through SS7 protocol

Researchers hack WhatsApp accounts through SS7 protocol

White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on…

9 years ago
Hackers Crack Businesses’ Security Using Social EngineeringHackers Crack Businesses’ Security Using Social Engineering

Hackers Crack Businesses’ Security Using Social Engineering

A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power…

9 years ago
Researcher arrested and charged for hacking elections websitesResearcher arrested and charged for hacking elections websites

Researcher arrested and charged for hacking elections websites

The security expert David Levin was arrested and charged after discovering  serious security flaws on a couple of election websites…

9 years ago
The hidden information behind 12,000 PoC Exploits shared onlineThe hidden information behind 12,000 PoC Exploits shared online

The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is…

9 years ago
Hackers can break into a facility by spending $700 on Amazon or eBayHackers can break into a facility by spending $700 on Amazon or eBay

Hackers can break into a facility by spending $700 on Amazon or eBay

Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth…

9 years ago
Hacker Interviews – The hacker: zurael sTzHacker Interviews – The hacker: zurael sTz

Hacker Interviews – The hacker: zurael sTz

This is the first of a series of  “Hacker Interviews” that will aim to help us get a better understanding…

9 years ago
STUPID LOCKY! Hackers disrupted a Locky ransomware CampaingSTUPID LOCKY! Hackers disrupted a Locky ransomware Campaing

STUPID LOCKY! Hackers disrupted a Locky ransomware Campaing

Hackers have disrupted a Locky campaign after they compromised one of the cybercriminal servers used by the threat actors. According…

9 years ago
Journey of a ‘Hacked Computer’ : From Torrents to BotnetsJourney of a ‘Hacked Computer’ : From Torrents to Botnets

Journey of a ‘Hacked Computer’ : From Torrents to Botnets

One out of every three websites were involved in transmitting malware to their users, which was found attached to their…

9 years ago
Is the Armageddon a PLC-Based Worm?Is the Armageddon a PLC-Based Worm?

Is the Armageddon a PLC-Based Worm?

Three German security researchers have presented a PLC-based worm with Proof-of-Concept based on the Siemens SIMATIC S7-1200 PLC. Three German…

9 years ago