Hacking

Robocop is (almost) here : Artificial Intelligence in your Security Team

DARPA organized a challenge where 7 finalists will battle it out with the Artificial Intelligence system to detect flaws and…

10 years ago

Hacker Interviews – Mr Xer

Today, thanks to the support of Sneaker, I have interviewed the hacker that goes online with the pseudonym of Mr…

10 years ago

Hacker Interviews – WauchulaGhost, a Ghost that hacks for our children

Enjoy the interview with WauchulaGhost (@wauchulaghost), one of the most active hackers in the fight against the IS online. Military,…

10 years ago

Furtim’s advance capabilities and the Energy Sector

The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company.…

10 years ago

US sentences Chinese hacker for stealing aerospace secrets

US sentences the Chinese hacker involved in the theft of industrial secrets on the F-22 and F-35 fighter jets, C-17…

10 years ago

xDedic Marketplace for hacked servers reappeared on Tor

Following a short disappearance, the xDedic market - the infamous ‘eBay’ of hacked servers, has made a new appearance on…

10 years ago

Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…

10 years ago

Experts found a government malware on the Dark Web

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be…

10 years ago

Hacker Interviews – John McAfee, the legend

Dear readers, I'm really proud and excited to share with you my interview with a legend Mr John McAfee. John…

10 years ago

The hidden link between the Angler EK drop and the Lurk gang

Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against…

10 years ago

This website uses cookies.