Hackers have stolen customer data from Titan Manufacturing and Distributing company for nearly one year

7 years ago

Cyber criminals have stolen customer data from the Titan Manufacturing and Distributing company for nearly one year using a malware.…

Australian Early Warning Network hacked and used to send fake alerts

7 years ago

A hacker obtained an unauthorized access to the Australian Early Warning Network over the weekend and abused it to send…

ReiKey app for macOS can detect Mac Keyloggers using event taps

7 years ago

ReiKey is a free tool that allows to scan and detect keylogger that install persistent keyboard "event taps" to intercept…

NSA will reveal its GHIDRA Reverse Engineering tool at RSA Conference

7 years ago

The National Security Agency (NSA) will release at the next RSA Conference a free reverse engineering framework called GHIDRA. GHIDRA…

Dark Overlord hacking crew publishes first batch of confidential 9/11 files

7 years ago

The Dark Overlord published the first batch of decryption keys for 650 confidential documents related to the 9/11 terrorist attacks.…

Security Affairs newsletter Round 195 – News of the week

7 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

Blur data leak potentially exposed data of 2.4 Million users

7 years ago

A misconfigured AWS S3 bucket is the root cause of a data leak that impacted 2.4 million Blur users, reported…

Did Aurora Ransomware infect you? You can decrypt file for free

7 years ago

Victims of the Aurora Ransomware could use a decryptor tool developed by the popular malware researcher Michael Gillespie to decrypt…

High Severity DoS bug affects Several Yokogawa products

7 years ago

A serious DoS flaw affects several industrial automation products manufactured by the Yokogawa Electric. The DoS vulnerability in several Yokogawa Electric…

Flaw in Skype for Android exposes photos and contacts

7 years ago

A security expert found a flaw in Skype for Android that could be exploited by an unauthenticated attacker to view…

This website uses cookies.