How to compromise PLC systems via stealthy Pin control attacks

9 years ago

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems…

Malware used to spy Iran’s nuclear negotiations in the Geneve’s venue

9 years ago

Switzerland’s attorney general has confirmed to have investigated the presence of spyware in a venue that also hosted talks on…

Shadows Kill Mirai Botnet caused an Internet outage in Liberia, what is the next one?

9 years ago

Mirai botnet was used to power a massive DDoS attack against Liberia causing the Internet outage in the entire country…

ISIS Is Watching you: Islamic State Hacking Team Shares Access to Security Cameras Around the Word

9 years ago

BLACKOPS Cyber (BOC) reported to the authorities that a well-known ISIS hacking team was sharing access links to widely used…

Cisco patched critical flaws in 900 series routers and Prime Home server

9 years ago

Cisco issued patches for two critical vulnerabilities affecting several products, including Cisco 900 Series Routers and Cisco Prime Home servers.…

Hospitals of the National Health Service (NHS) network were paralyzed by a malware

9 years ago

A malware compromised the NHS network, hundreds of scheduled operations, appointments, and diagnostic procedures have been canceled. The situation is…

Critical DOM XSS flaw on Wix.com put million websites at risk

9 years ago

A DOM-based cross-site scripting vulnerability in the cloud-based development platform Wix.com put million websites at risk. The cloud-based development platform…

Critical MySQL flaws can allow attackers to hack into your server

9 years ago

The security expert Dawid Golunski disclosed critical vulnerabilities in MySQL, MariaDB and PerconaDB can lead fully compromise of servers. Critical…

Sundown exploit kit – Conquering the criminal underground

9 years ago

Cisco Talos group analyzed the evolution of the Sundown exploit kit that over the past six months has become responsible…

Stealth Cell Tower, how to spy on workers with a harmless printer

9 years ago

Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for…

This website uses cookies.