hacking news

7 VPN services left data of millions of users exposed online

vpnMentor experts reported that seven Virtual Private Network (VPN)  recently left 1.2 terabytes of private user data exposed to online. Security…

6 years ago

BadPower attack could burn your device through fast charging

Researchers devised a technique dubbed BadPower to alter the firmware of fast chargers to cause damage to connected systems or…

6 years ago

REVil ransomware infected 18,000 computers at Telecom Argentina

Another telco company was hit by a ransomware, roughly 18,000 computers belonging to Telecom Argentina were infected over the weekend.…

6 years ago

Two more cyber attacks hit Israel’s water facilities in June

In April a cyber attack hit an Israeli water facility, last week, officials revealed two more cyber attacks against other…

6 years ago

A flaw in Zoom’s Vanity URL feature could have been exploited in phishing attacks

A vulnerability affecting the Zoom feature dubbed Vanity URL could have been exploited by hackers for phishing attacks. A vulnerability…

6 years ago

Ghost Squad Hackers defaced a second European Space Agency (ESA) site in a week

A group of hacktivists that goes online with the name Ghost Squad Hackers has defaced for the second time in…

6 years ago

Twitter reveals that hackers also downloaded data from eight compromised accounts

The social media giant Twitter confirmed that hackers compromised 130 accounts in last week hack and downloaded data from eight…

6 years ago

Diebold Nixdorf warns of a wave of ATM black box attacks across Europe

ATM maker Diebold Nixdorf is warning banks a new ATM black box attack technique that was recently employed in cyber…

6 years ago

Experts warn of massive internet scans for SAP systems affected by RECON Vulnerability

Hackers have been scanning the Internet for SAP systems affected by RECON vulnerability, researchers from Bad Packets warn. Researchers from…

6 years ago

Introducing the PhishingKitTracker

Experts that want to to study phishing attack schema and Kit-composition can use the recently PhishingKitTracker, which is updated automatically.…

6 years ago

This website uses cookies.