Hacking

The Hajime Botnet continues to grow and implements a new attack technique

The mysterious Hajime Botnet continues to grow and reached 300,000 IoT Devices, the author also implemented a new attack method.…

9 years ago

Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security…

9 years ago

Cybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploit

The Interpol located and shut down nearly 9,000 Command and control servers located in Asia and hacked with a WordPress…

9 years ago

R2Games company breached for the second time in two years, over one million accounts compromised

R2Games compromised for the second time in a few years, more than one million accounts of U.S., France, German, and…

9 years ago

Russian APT28 group also targeted French Presidential candidate Emmanuel Macron

The campaign of the French Presidential candidate Emmanuel Macron has been targeted by the notorious cyber espionage APT28 group. Yesterday…

9 years ago

Squirrelmail 1.4.22 is affected by a Remote Code Execution flaw, no fix is available

The popular PHP webmail package SquirrelMail is affected by a remote code execution vulnerability tracked as CVE-2017-7692. The popular PHP…

9 years ago

Technical issue at the Jharkhand govt website caused the exposure of more than 1.4 million Aadhaar numbers

Personal information associated with more than a million Aadhaar numbers published on Jharkhand govt website due to a technical problem.…

9 years ago

Ops, hackers can exfiltrate data from air-gapped networks through a malware controlled via a scanner

A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled…

9 years ago

Hackers compromised thousands of Windows boxes using leaked NSA hack tools DOUBLEPULSAR and ETERNALBLUE

Security researcher warn of hackers compromised thousands of Windows boxes using leaked NSA hack tools DOUBLEPULSAR and ETERNALBLUE Security expert Dan…

9 years ago

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, 'Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies' about cybercriminal communications of threat…

9 years ago

This website uses cookies.