Kapustkiy hacked a website belonging to the Venezuela Army

9 years ago

The hacker Kapustkiy has breached the Venezuela Army and leaked 3000 user records containing personal information such as names, emails,…

What Happens if you plug a USBKill in a gaming console or a car?

9 years ago

Ill-intentioned could destroy everything using the USBKill device, including gaming console, mobile devices, Google Pixel and also circuits in modern…

A flaw allows to bypass the activation lock on iPhone and iPad

9 years ago

Researchers discovered a bug that can be exploited to bypass Apple’s Activation Lock feature and gain access to the homescreen…

The Immaterial Khilafah – Global Intelligence Insight Report

9 years ago

As the coalition forces started to enter the Iraqi city of Mosul, many have seen Al-Baghdadi’s speech as desperate plea,…

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

9 years ago

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month.…

The dreaded Shamoon Wiper is back in a new attack

9 years ago

Shamoon wiper is back, security experts from Palo Alto Networks and Symantec spotted it in an attack on a single…

More than 1 Million Google accounts hacked by Gooligan Android Malware

9 years ago

Experts from the security firm CheckPoint discovered a new Android malware dubbed Gooligan that has already compromised more than a…

Thousands of UK National Lottery player accounts compromised

9 years ago

Roughly 26,500 accounts of the UK National Lottery players were accessed by cybercriminals, authorities are investigating the case. According to…

Data on Europol terrorism investigations accidentally leaked online

9 years ago

According to a Dutch television program data on several investigations into the terrorism groups conducted by the Europol were accidentally…

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

9 years ago

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…

This website uses cookies.