Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky…
FireEye speculates that behind the hack of France’s TV5Monde television channel there is the popular APT28 that used the pseudonymous…
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group.…
ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI…
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We…
The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what…
US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to…
Security experts involved in investigation on the attack against the Bundestag suspect that the hack was part of a large-scale…
This website uses cookies.