Keep Windows machines infected abusing Windows Desired State Configuration (DSC)

10 years ago

Two forensics experts have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the…

Is the hack of an email server behind the Panama Papers?

10 years ago

Which is the source of Panama Papers? According to Mossack the hackers breached its systems, according to the experts its…

Flaw in CISCO FirePower Firewall allows malware evade detection

10 years ago

A flaw in the family of CISCO FirePower Firewall devices allows malware to bypass detection mechanism. Cisco is releasing security…

DB with records of 50 Million Turkish Citizens Leaked Online. Are they recycled data?

10 years ago

A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a…

Why malware like the Samsam ransomware are so dangerous for hospitals?

10 years ago

The FBI issued a confidential urgent "Flash" message to the businesses and organizations about the Samsam Ransomware, why it is…

The Dronecatcher evolves featuring a new improvement

10 years ago

Delft Dynamics conducted a successful test, where a drone was taken out of the air by another unmanned aerial vehicle…

US and UK Will Simulate a Cyber Attacks on nuclear plants in 2016

10 years ago

US and UK are planning to simulate a cyber attacks on nuclear plants, to test their resilience in the light…

German intelligence Agency BND spied on Netanyahu

10 years ago

The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to…

Hacking connected lightbulbs to breach Air-Gapped networks

10 years ago

Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two…

CloudFlare considers 94 percent of the Tor traffic as “per se malicious”

10 years ago

Experts at CloudFlare revealed that 94 percent of the Tor traffic they see is “per se malicious,” but Tor Project…

This website uses cookies.