The Shadow Brokers are offering the NSA arsenal for direct sale

9 years ago

The Shadow Brokers group has changed the model of sale, it has put up the NSA's hacking arsenal for direct…

BlackEnergy hackers, now TeleBots, target Ukrainian banks

9 years ago

The BlackEnergy hacker group that targeted the Ukrainian grid one year ago, now identified as TeleBots, are targeting Ukrainian banks.…

Phishing campaign on Office 365 Business users leverages Punycode

9 years ago

Security researchers discovered a new phishing campaign leveraging Punycode and a bug in Office 365 defense systems to deceive victims.…

Yahoo admits one billion accounts exposed in a newly discovered data breach

9 years ago

The tech giant Yahoo admitted crooks have probably stolen details from more than a billion user accounts, and the incident…

Cryptolulz hacked the website of the Russian embassy of Armenia

9 years ago

The black hat hacker Cryptolulz broke into the database of the website of Russian embassy of Armenia (www.embassyru.am) and leaked…

Experts spotted a Skype backdoor for Mac, it could be a coding bug

9 years ago

Experts from Trustwave discovered an authentication bypass vulnerability affecting the Mac version of Skype, experts classified it as a Skype…

Expedia Hacked By Its Own Employee, a case study

9 years ago

The Expedia employee, John Ly, is accused of hacking into executives computers to access corporate confidential information. Its no secret,…

Infected firmware spotted in well-known low-cost Android devices

9 years ago

Experts from Doctor Web spotted new Trojans into the firmware of several dozens of low-cost Android smartphones and tablets. Again…

Adobe patches multiple flaws including a Flash Zero-Day exploited in the wild

9 years ago

Adobe issued security patches that address multiple flaws in 9 products, including fixes for zero-day vulnerabilities that has been exploited…

Hacking McAfee VirusScan Enterprise for Linux, upgrade it asap

9 years ago

Intel Security McAfee VirusScan Enterprise for Linux is affected by ten vulnerabilities that can be chained for remote code execution…

This website uses cookies.