Hacking

Seoul blames North Korea for hacking a South Korean defense contractor

Is the North Korea behind the hack of a South Korean defense contractor? The officials announced an investigation into the…

10 years ago

CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild

CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited to launch malware-based attacks in the…

10 years ago

Researchers hack WhatsApp accounts through SS7 protocol

White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on…

10 years ago

Hackers Crack Businesses’ Security Using Social Engineering

A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power…

10 years ago

Researcher arrested and charged for hacking elections websites

The security expert David Levin was arrested and charged after discovering  serious security flaws on a couple of election websites…

10 years ago

The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is…

10 years ago

Hackers can break into a facility by spending $700 on Amazon or eBay

Hackers demonstrated to the Tech Insider how to break into any office by purchasing from Amazon and eBay $700 worth…

10 years ago

Hacker Interviews – The hacker: zurael sTz

This is the first of a series of  “Hacker Interviews” that will aim to help us get a better understanding…

10 years ago

STUPID LOCKY! Hackers disrupted a Locky ransomware Campaing

Hackers have disrupted a Locky campaign after they compromised one of the cybercriminal servers used by the threat actors. According…

10 years ago

Journey of a ‘Hacked Computer’ : From Torrents to Botnets

One out of every three websites were involved in transmitting malware to their users, which was found attached to their…

10 years ago

This website uses cookies.