Unsecure Hadoop Distributed File System installs 5 PB of Data

9 years ago

According to Shodan search, unprotected Hadoop Distributed File System installations expose 5 PB of data. Hadoop servers that are not…

Crowdfunding initiative aims to buy Shadow Brokers leak before threat actors

9 years ago

Crowdfunding initiative aims to buy Shadow Brokers leak before threat actors will start using the hacking tools and exploits in…

President Putin blames Patriotic Russian hackers for recent Election attacks

9 years ago

Russian President Putin says patriotic hackers may have powered attacks against foreign countries and denied Russia involvement. President Vladimir Putin…

Data Breach – OneLogin Password Manager Hacked

9 years ago

OneLogin company announced on Thursday that it had "detected unauthorised access" in its systems located in the United States. OneLogin…

The Fireball malware already infected more than 250 million computers worldwide running both Windows and Mac OS

9 years ago

Check Point have discovered a massive malware campaign spreading the Fireball malware, it has already infected more than 250 million…

#Vault7: CIA Pandemic implant turns file servers into malware infectors

9 years ago

Wikileaks released a new lot of documents belonging to the Vault7 dump that details the CIA project codenamed 'Pandemic implant'…

Dark Web users of a child porn website tracked after visiting file sharing site

9 years ago

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The…

ISIS Publishes Detailed Guide on How to Use Services Like Craigslist to Lure Non-Believers to Their Death

9 years ago

ISIS has released a detailed guide on how to murder non-believers. The tutorial provides advice on how to lure targets…

Top Defense contractor left Pentagon docs unsecured on Amazon server

9 years ago

A top defense contractor left tens of thousands sensitive Pentagon documents on Amazon Server Without any protection in places. The…

A recently discovered Linux flaw could be exploited by Sudo Users to gain Root Privileges

9 years ago

Security researchers at Qualys Security have discovered a Linux Flaw that could be exploited to escalate privileges and overwrite any…

This website uses cookies.