Hacking

Adobe to patch Flash Player zero-day vulnerability actively exploited in the wild

A new Flash Player zero-day vulnerability (CVE-2016-1019) has been actively exploited by threat actors in attacks against systems running Windows…

10 years ago

How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to…

10 years ago

Homeland Security – US Consular Consolidated Database vulnerable to cyber attacks

According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD)  database is open…

10 years ago

APT6 compromised the US government networks for years

The federal bureau of investigation issued an alert related the APT6 state-sponsored hacking group that has compromised the US Government…

10 years ago

Keep Windows machines infected abusing Windows Desired State Configuration (DSC)

Two forensics experts have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the…

10 years ago

Is the hack of an email server behind the Panama Papers?

Which is the source of Panama Papers? According to Mossack the hackers breached its systems, according to the experts its…

10 years ago

DB with records of 50 Million Turkish Citizens Leaked Online. Are they recycled data?

A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a…

10 years ago

US and UK Will Simulate a Cyber Attacks on nuclear plants in 2016

US and UK are planning to simulate a cyber attacks on nuclear plants, to test their resilience in the light…

10 years ago

German intelligence Agency BND spied on Netanyahu

The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to…

10 years ago

Hacking connected lightbulbs to breach Air-Gapped networks

Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two…

10 years ago

This website uses cookies.