Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy

8 years ago

Today I'd like to share a full path analysis including a KickBack attack which took me to gain full access…

Federal prosecutors indicted a 20-year-old man who built the Satori botnet

8 years ago

A youngster (20) from Washington was indicted last week on federal computer hacking charges after rival hackers fingered him as…

What Happens to Whistleblowers After They Blow the Whistle?

8 years ago

Whistleblowers are a controversial subgroup of the modern workforce. What Happens to Whistle Site after they reveal uncomfortable truths? Whistleblowers…

BusyGasper spyware remained undetected for two years while spying Russians

8 years ago

Security experts from Kaspersky Lab have uncovered a new strain of Android malware dubbed BusyGasper that remained hidden for two years.…

4-year old Misfortune Cookie vulnerability threatens Capsule Technologies medical gateway device

8 years ago

The Misfortune Cookie flaw is threatening medical equipment that connects bedside devices to the hospital's network infrastructure. In December 2104,…

Air Canada data breach – 20,000 users of its mobile app affected

8 years ago

Air Canada data breach - The incident was confirmed by the company and may have affected  20,000 customers (1%) of…

What the Blockchain Taught Us about IT Security

8 years ago

It is not just about security, but in utilizing Blockchain to secure your company and your information. With how fast…

CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011

8 years ago

Qualys experts discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least…

Data of 130 Million hotel chain guests offered for 8 BTC on Dark Web

8 years ago

A hacker is offering for sale the personal details of over 130 million hotel chain guests on a Chinese Dark…

Experts published a PoC code for Intel Management Engine JTAG flaw

8 years ago

A group of security researchers has published a proof-of-concept exploit code for a vulnerability in the Intel Management Engine JTAG. A…

This website uses cookies.