hacking news

Several EA Sports FIFA 22 players have been hacked

Several EA Sports FIFA 22 players claim to have been hacked, they say to have lost access to their personal…

4 years ago

Abcbot and Xanthe botnets have the same origin, experts discovered

Experts linked the C2 infrastructure behind an the Abcbot botnet to a cryptocurrency-mining botnet attack that was uncovered in December…

4 years ago

Indian-linked Patchwork APT infected its own system revealing its ops

The India-linked threat actor Patchwork infected one of their own computers with its RAT revealing its operations to researchers. An…

4 years ago

New ZLoader malware campaign hit more than 2000 victims across 111 countries

A malware campaign spreads ZLoader malware by exploiting a Windows vulnerability that was fixed in 2013 but in 2014 Microsoft…

4 years ago

Cyber Defense Magazine – January 2022 has arrived. Enjoy it!

Cyber Defense Magazine January 2022 Edition has arrived. We hope you enjoy this month’s edition…packed with 155 pages of excellent…

4 years ago

US NCSC and DoS share best practices against surveillance tools

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. The US…

4 years ago

Swiss army asks its personnel to use the Threema instant-messaging app

The Swiss army has banned all instant messaging apps, including Signal, Telegram, and WhatsApp, recommending the use of the Threema…

4 years ago

Russian submarines threatening undersea cables, UK defence chief warns

Russian submarines threatening undersea network of undersea cables, says UK defence chief Sir Tony Radakin UK defence chief Sir Tony…

4 years ago

Security Affairs newsletter Round 348

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…

4 years ago

Unauthenticated RCE in H2 Database Console is similar to Log4Shell

Researchers disclosed a critical RCE flaw in the H2 open-source Java SQL database which is similar to the Log4J vulnerability.…

4 years ago

This website uses cookies.