With the advent of technology, terrorists have changed their strategies and converted themselves into high-tech & sophisticated groups. “While Osama…
In March 2016 experts from FireEye spotted a malicious campaign conducted by a financially motivated threat actor that leveraged on…
Security experts collected evidence that up to 36 global organizations have been hacked via exploits against an old flaw in…
Facebook hopes to make security education easier for students with the release of its Capture the Flag platform to open…
The recently discovered ImageMagick critical vulnerability (CVE-2016-3714) is being exploited in the wild for reconnaissance. The security researcher John Graham-Cumming…
Is the North Korea behind the hack of a South Korean defense contractor? The officials announced an investigation into the…
CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited to launch malware-based attacks in the…
The Euro 2016 will be held in June in France and online fraudsters already started launching football-themed spam campaigns on…
White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on…
A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power…
This website uses cookies.