GhostShell is back and leaked 36 million records

10 years ago

GhostShell is back and leaked 36 million records from vulnerable networks to invite experts to pay attention to the new…

British MPs emails are routinely accessed by GCHQ

10 years ago

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs…

Ransomware campaigns … how to net $90,000 per year

10 years ago

Experts at Flashpoint published an interesting analysis of a ransomware campaign organized by a small gang of cyber criminals. Cybercrime…

Unlimited surveillance capabilities, but it’s going to cost you

10 years ago

Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company…

10,000+ WordPress websites compromised due to a flaw in WP Mobile Detector plugin

10 years ago

More than 10,000 WordPress installations being exploited in the wild due to a vulnerability in the  WP Mobile Detector plugin.…

IRONGATE, a mysterious ICS Malware discovered in the wild

10 years ago

Experts at FireEye spotted IRONGATE a mysterious strain of malware that appears to be designed to target industrial control systems…

TeamViewer hacked? The company officially denies it

10 years ago

Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies…

Tor Browser 6.0 is out with significant privacy and security improvements

10 years ago

The Tor Project released the Tor Browser 6.0, the last version of the popular Tor browser that brings along significant…

New evidence links the NK Lazarus Group to SWIFT banking attacks

10 years ago

The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While…

Lenovo Accelerator Application contains a bug that allows remote hack of your PC

10 years ago

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code…

This website uses cookies.