hacking news

Scheme flooding fingerprint technique may deanonymize Tor users

FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the…

5 years ago

Darkside gang lost control of their servers and funds

The operators of the Darkside ransomware announced that they have lost control of their infrastructure and part of the funds…

5 years ago

Magecart gang hides PHP-based web shells in favicons

Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript…

5 years ago

Ireland’s Health Service Executive hit by ransomware attack

Ireland’s Health Service Executive service shut down its IT systems after they were hit with a “significant ransomware attack.” Another major…

5 years ago

Colonial Pipeline likely paid a $5M ransom to DarkSide

DarkSide demanded a $5 million ransom to Colonial Pipeline, which has quickly recovered operations, did it pay? The Colonial Pipeline…

5 years ago

Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack

Rapid7 disclosed that unauthorized third-party had access to source code and customer data as result of Codecov supply chain attack.…

5 years ago

Security at Bay: Critical Infrastructure Under Attack

The recent Colonial Pipeline attack highlights the dangers that are facing Critical Infrastructure worldwide. The attack perpetrated by hackers on…

5 years ago

Biden signed executive order to improve the Nation’s Cybersecurity

President Joe Biden signed an ambitious executive order to dramatically improve the security of the US government networks. President Biden signed…

5 years ago

US CISA and FBI publish joint alert on DarkSide ransomware

FBI and DHS's CISA have published a joint alert on DarkSide ransomware activity after the disruptive attack on Colonial Pipeline.…

5 years ago

How Companies Need to Treat User Data and Manage Their Partners

After the introduction of CCPA and GDPR, much more attention is given to third-party risks, and the privacy terms and…

5 years ago

This website uses cookies.