Hacking

4 Industries That Have to Fight the Hardest Against Cyberattacks

Society's dependence on internet-based technologies means security professionals must defend against cyberattacks as well as more traditional threats, such as…

7 years ago

Quora data breach: hackers obtained information on roughly 100 million users

Another day another illustrious victim of the data breach, the popular question-and-answer website Quora suffered a major data breach that…

7 years ago

Russia-linked APT Sofacy leverages BREXIT lures in recent attacks

Russia-linked cyber-espionage group Sofacy, (aka APT28, Pawn Storm, Fancy Bear, Sednit, Tsar Team, and Strontium) use BREXIT lures in recent attacks. The APT group used Brexit-themed bait documents on…

7 years ago

Experts found data belonging to 82 Million US Users exposed on unprotected Elasticsearch Instances

Security experts at HackenProof are warning Open Elasticsearch instances expose over 82 million users in the United States. Experts from HackenProof…

7 years ago

New Zealand Security Bureau halts Spark from using Huawei 5G equipment

New Zealand intelligence agency asked mobile company Spark to avoid using Huawei equipment for 5G infrastructure. According to New Zealand's Government…

7 years ago

Hacker hijacks printers worldwide to promote popular YouTube channel

The TheHackerGiraffe used the Printer Exploitation Toolkit (PRET) to hijack +50k vulnerable printers to Promote PewDiePie YouTube Channel. An anonymous hacker hijacked over…

7 years ago

Moscow’s New Cable Car closed due to a ransomware infection

Two days after Moscow opened a new cable car system hackers infected its computer systems with ransomware. The cable car system…

7 years ago

Security Affairs newsletter Round 191 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me…

7 years ago

MITRE evaluates Enterprise security products using the ATT&CK Framework

The MITRE Corporation’s ATT&CK framework has been used to evaluate the efficiency of several enterprise security products designed by several…

7 years ago

New PowerShell-based Backdoor points to MuddyWater

Security researchers at Trend Micro recently discovered PowerShell-based backdoor that resembles a malware used by MuddyWater threat actor. Malware researchers at Trend…

7 years ago

This website uses cookies.