InterContinental Hotels Group, the international hotel chain confirmed a second credit card breach

9 years ago

The InterContinental Hotels Group announced that last week payment card systems at more than 1,000 of its hotels had been compromised by…

Homograph Phishing Attacks are almost impossible to detect on major browsers

9 years ago

The Chinese security Xudong Zheng is warning of Homograph Phishing Attacks are "almost impossible to detect" also to experts. The…

Karmen Ransomware, a cheap RaaS service that implements anti-analysis features

9 years ago

Experts at Recorded Future have discovered a cheap RaaS, the Karmen Ransomware that deletes decryptor if detects a sandbox. Security experts…

Moving threat landscape: The reality beyond the cyberwarfare

9 years ago

It started quietly as a probability not a reality. Now within months cyberwarfare has become a reality plausible as the…

The alleged link between the Shadow Brokers data leak and the Stuxnet cyber weapon

9 years ago

Security researchers who analyzed the documents and hacking tools included in the last Shadow Brokers dump found a link to…

Who is offering the CradleCore Ransomware as source code?

9 years ago

CradleCore ransomware is a malware offered in the underground as a source code, instead of the classic ransomware-as-a-service (RaaS) model. According to the…

Windows attacks via CVE-2017-0199 – Practical exploitation! (PoC)

9 years ago

The Security expert David Routin (@Rewt_1) has detailed a step by step procedure to exploit the recently patched cve-2017-0199 vulnerability exploited…

The failure of the missile launch by North Korea may have been caused by US cyber attack

9 years ago

The failure of the missile launch made the North Korea may have been thwarted by a cyber attack powered by…

Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled

9 years ago

Microsoft published the biannual transparency report - The number of US foreign intelligence surveillance requests more than doubled. Microsoft shared…

Terror EK rising in the threat landscape while Sundown EK drops

9 years ago

The Sundown EK has been inactive since early this year, the Terror EK is being very popular in the cybercriminal…

This website uses cookies.