Hacking

Robocop is (almost) here : Artificial Intelligence in your Security Team

DARPA organized a challenge where 7 finalists will battle it out with the Artificial Intelligence system to detect flaws and…

9 years ago

Hacker Interviews – Mr Xer

Today, thanks to the support of Sneaker, I have interviewed the hacker that goes online with the pseudonym of Mr…

9 years ago

Hacker Interviews – WauchulaGhost, a Ghost that hacks for our children

Enjoy the interview with WauchulaGhost (@wauchulaghost), one of the most active hackers in the fight against the IS online. Military,…

9 years ago

Furtim’s advance capabilities and the Energy Sector

The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company.…

9 years ago

US sentences Chinese hacker for stealing aerospace secrets

US sentences the Chinese hacker involved in the theft of industrial secrets on the F-22 and F-35 fighter jets, C-17…

9 years ago

xDedic Marketplace for hacked servers reappeared on Tor

Following a short disappearance, the xDedic market - the infamous ‘eBay’ of hacked servers, has made a new appearance on…

9 years ago

Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…

9 years ago

Experts found a government malware on the Dark Web

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be…

9 years ago

Hacker Interviews – John McAfee, the legend

Dear readers, I'm really proud and excited to share with you my interview with a legend Mr John McAfee. John…

9 years ago

The hidden link between the Angler EK drop and the Lurk gang

Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against…

9 years ago

This website uses cookies.