Hacking

Necurs botnet is back and starts delivering the Locky ransomware

Cisco Security Team has noticed traces of traffic from the dormant Necurs botnet and they are warning of a possible…

9 years ago

Which is the real identity of the Mirai Author Anna-Senpai?

The popular investigator Brian Krebs published the details of his investigation on the identity of the Mirai author Anna-Senpai. In…

9 years ago

2016 Christmas Ukraine power outage was caused by hackers

Ukrenergo confirmed that preliminary results of its investigation showed that the Ukraine power outage that occurred in December was caused…

9 years ago

Crashing iPhone Or iPad with a simple Emoji text message

A simple sequence of three character-long text message containing Emoji can cause the block and the reboot os iPhones and…

9 years ago

US-CERT – Warning, Shadow Brokers Hackers are offering an SMB Zero-Day exploit

The US-CERT has issued a warning after the Shadow Brokers hackers have offered to sell what it claims to be…

9 years ago

Quimitchin, a Mac backdoor that includes antiquated code

Researchers at Malwarebytes have discovered the first Mac malware of 2017, dubbed Quimitchin, that was used against  biomedical research institutions.…

9 years ago

US cancer agency targeted by a singular ransomware attack

A new ransomware campaign has targeted the not-for-profit cancer services organisation "Little Red Door" requesting a US$44,000 ransom. A new…

9 years ago

The Carbanak gang is with a new modus operandi, Google services as C&C

The infamous Carbanak cybercrime gang is back and is leveraging Google services for command-and-control of its malicious codes. The dreaded…

9 years ago

Hacker found a way to hack Facebook by exploiting the ImageMagick flaw

The bug hunter Andrew Leonov has described how to exploit an ImageMagick flaw to remotely execute code on a Facebook…

9 years ago

Thai TrueOnline ZyXEL and Billion routers still unpatched since July

The security researcher Pedro Ribeiro disclosed several vulnerabilities in the ZyXEL customized routers that could be easily exploited by hackers.…

9 years ago

This website uses cookies.