NATO Warsaw summit 2016, what about cyber security?

10 years ago

What about cyber security issues discussed during the NATO members during the Warsaw summit held in Poland on 8 and…

The hidden link between the Angler EK drop and the Lurk gang

10 years ago

Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against…

Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED Jul.03-Jul.10, 2016

10 years ago

Terrorism - JIHADIST OPS - Jul.03-10, 2016 - This is merely an intel brief. Subscribe GII for a more comprehensive…

Be careful backdoored Pokemon GO Android App spotted in the wild

10 years ago

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

Netia SA, the second telecom company hacked by a Ukrainian hacker

10 years ago

A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum…

Hacking mobile via hidden voice commands embedded in YouTube videos

10 years ago

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube…

Hacker Interviews – s1ege

10 years ago

Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of…

Realstatistics campaign leads to ransomware via compromised sites

10 years ago

Threat actors in the wild are behind the Realstatistics campaign are leveraging on out-of-date CMSs to deliver the CryptXXX ransomware.…

Security Affairs newsletter Round 68 – News of the week

10 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

Hacker breached an Amazon server containing 80,000 login credentials

10 years ago

The hacker behind the Twitter account 0x2Taylor is claiming to have breached one of the Amazon servers containing 80,000 login…

This website uses cookies.