Hacking

Petwrap Ransomware massive attack – 24 hours later

A new strain of the infamous Petya ransomware dubbed Petwrap, is infecting computers in different states, mostly in Ukraine and…

8 years ago

A new massive attack allegedly based on Petwrap ransomware hits organizations in several states

A new wave of cyber attacks is shocking the IT industry, a massive attack leveraging the Petwrap ransomware has infected…

8 years ago

Pro-ISIS group defaced US Government websites in 3 states

Several government websites were hacked by a pro-ISIS group that is calling itself Team System DZ, including those of the…

8 years ago

Google Hacker found a new way to bypass Microsoft Windows Defender

The Google Project Zero expert Tavis Ormandy has found a flaw in Windows Defender that allow attackers to bypass the Microsoft…

8 years ago

Company fired an employee, he shut down water utility providers’ networks in 5 cities

A former employee was sentenced to one year and one day in prison for damaging the IT networks of several water utility…

8 years ago

UK Parliament shut down external access to email accounts after cyberattack

The UK Parliament has suffered the biggest ever cyber attack against the email systems, it shut down external access to…

8 years ago

Stealing AES-256 keys in seconds using €200 of off-the-shelf components

Security experts at Fox‑IT have demonstrated that is possible sniff AES-256 encryption keys from a distance of one meter (3.3…

8 years ago

UK politicians’ login credentials up for sale in the dark web

Russians hackers are offering for sale on the dark web login credentials of thousands of top UK politicians, top officials,…

8 years ago

Experts devised the GhostHook Attack technique to bypass Windows 10 PatchGuard Protections

Experts have devised the GhostHook Attack technique to install rootkits on machines running the Windows 10 operating system. Security flaws…

8 years ago

OpenVPN fixed several remotely exploitable flaws that were not detected by recent audits

OpenVPN fixed several vulnerabilities that could be exploited by remote attackers, the flaws were not detected in a recent audit.…

8 years ago

This website uses cookies.