Hacking

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…

9 years ago

An audit revealed dozen vulnerabilities in the cURL

Security experts who conducted an audit on cURL discovered nearly a dozen vulnerabilities that were patched in the last release.…

9 years ago

More than 900k routers of Deutsche Telekom German users went offline

Deutsche Telekom confirmed that more than 900,000 routers began to have serious problems connectivity problems due to a cyber attack.…

9 years ago

Hackers crashed San Francisco’s Municipal railway systems

Last week, unknown attackers hacked the computer systems of the San Francisco’s Municipal railway giving riders a free ride all…

9 years ago

Hackers offer a huge Mirai botnet as a DDoS-for-hire service

The hackers Popopret and BestBuy are offering a DDoS-for-hire service leveraging a Mirai botnet composed of around 400,000 compromised devices. We have…

9 years ago

Scammers advertise backdoored phishing templates on YouTube

Security experts from Proofpoint firm observed scammers exploiting YouTube to promote their backdoored phishing templates. According to experts from the…

9 years ago

Kapustkiy joins the Powerful Greek Army and hacked High Commission of Ghana & Fiji in India

Kapustkiy hacked the High Commission of Ghana & Fiji in India, he also confirmed to have joined the Powerful Greek Army…

9 years ago

ImageGate attack – How to spread malware via poisoned .JPG

Security experts from Checkpoint have discovered a new malware-based campaign through Facebook leveraging an image obfuscation trick dubbed ImageGate. Security…

9 years ago

Crooks steal millions from European ATMs with jackpotting attacks

Criminal gangs like the Cobalt gang are now focusing their efforts on the banks to steal cash directly from the…

9 years ago

How to steal a Tesla car by hacking the mobile app

A group of researchers from the security firm Promon has demonstrated how cyber criminals could take control of the Tesla…

9 years ago

This website uses cookies.