Turla APT malware now retrieves C&C address from Instagram comments

9 years ago

A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address…

US intelligence officials believe Russian Hackers are behind the Qatar hack

9 years ago

US intelligence officials believe Russi-linked hackers are behind the Qatar hack and used false news to prompt a diplomatic crisis…

Russia-linked hacker group APT28 continues to target Montenegro

9 years ago

Once again, Montenegro was targeted by the Russia-linked hacker group APT28, according to the experts it is just the beginning.…

Exfiltrating data from Air-Gapped Networks via Router LEDs

9 years ago

A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware…

4 Possible Ways to Make Your Browser Hacker-Proof

9 years ago

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay…

FBI arrests NSA contractor Reality Leigh Winner for leaking top-secret report

9 years ago

The FBI agents arrested the NSA contractor Reality Leigh Winner for leaking the top-secret report, here's how she was identified.…

The Active Cyber Defense Certainty Act Makes Hacking Back Anything But “Certain”

9 years ago

Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active…

Malvertising campaign in Google Search redirected users to tech support scam

9 years ago

Malicious ads in Google search results for the US retail giant Target redirected users to a tech support scam. The malvertising campaign…

NSA top-secret report details Russian cyber operations days before 2016 election

9 years ago

Russian intelligence powered a cyber attack on at least one US voting software supplier and sent spear-phishing emails to election…

Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign

9 years ago

Experts killed tens of thousands of subdomains used by crooks to host the RIG Exploit Kit that were set up…

This website uses cookies.