Google was aware of Russian APT28 group years before others

9 years ago

Lorenzo Bicchierai from MotherBoard shared an interesting private report about Russian cyber espionage operations conducted by APT28, the document was leaked…

IBM shares details on the attack chain for the Shamoon malware

9 years ago

Security experts at IBM published a report that includes precious details on the attack chain of the dreader Shamoon cyberweapon.…

Yahoo notifies users hackers are forging “cookies” to take over their accounts

9 years ago

Yahoo notifies users that hackers are forging "cookies" or files used in the authentication process to access their accounts, instead…

Russian hacker Rasputin breaches over 60 Universities and Government Agencies

9 years ago

The Russian-speaking black hat hacker Rasputin, hacked systems of more than 60 universities and U.S. government agencies. According to the…

Signal introduced the Video call feature in public beta release

9 years ago

Signal, the most secure instant messaging app, introduced the Video call feature in public beta release. You can test is…

Operation Kingphish: Cyber Attacks against human rights activists in Qatar and Nepal

9 years ago

Amnesty International has recently uncovered a spear phishing campaign dubbed Operation Kingphish that targeted groups in Qatar and Nepal. Human…

BitDefender found the first MAC OS version of the X-Agent used by the APT28

9 years ago

Security experts at Bitdefender discovered a MAC OS version of the X-Agent malware used by the Russian APT28 cyberespionage group.…

Adobe just fixed thirteen code execution flaws in Flash Player

9 years ago

Adobe addressed thirteen highest severity code execution vulnerabilities in Flash Player for Windows, MAC OS, and Chrome. Adobe released security updates…

Senators want more info on Trump’s personal phone and its defense

9 years ago

Two US senators want detailed info on Trump’s personal phone and the way the Defense Information Systems Agency (DISA) will…

A simulation shows how a ransomware could hack PLCs in a water treatment plant

9 years ago

The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment…

This website uses cookies.