MongoDB DB containing 93.4 million Mexican voter records open online

10 years ago

The security expert  Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records.…

Facebook hacked, someone deployed a malicious webshell on its server

10 years ago

Facebook hacked!  The security expert Orange Tsai discovered the presence of a malicious webshell on one of the company servers.…

FBI paid more than $1.3 million to hack into San Bernardino shooter iPhone

10 years ago

FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to…

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

10 years ago

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

Asian Nation-State hackers use fileless RAT for their hacking campaign

10 years ago

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

10 years ago

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

Cisco Wireless LAN Controller affected by severe flaws. Patch it now

10 years ago

Cisco has released a series of security updates to fix several vulnerabilities in the CISCO Wireless LAN Controller (WLC) products.…

The Australian government presents its Cyber Security Strategy

10 years ago

The Australian government has presented his Cyber Security Strategy and admitted the ability to conduct offensive cyber operations. The Australian…

RansomWhere, the free ransomware detection tool for Mac OS X

10 years ago

The former NSA expert Patrick Wardle has designed RansomWhere, a free ransomware detection tool for the protection of Mac OS…

A new strain of Teslacrypt implements sophisticated evasion

10 years ago

The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types.…

This website uses cookies.