Security Affairs

South Korea targeted by a cyber espionage campaign, experts blame Norks

South Korea is once against under attack, alleged nation-state hackers have launched a sophisticated cyber espionage campaign on organizations in…

9 years ago

A group of Iraqi hackers called Pro_Mast3r defaced a Trump website

The group of Iraqi hackers called "Pro_Mast3r" has breached the server hosting a Trump website associated with campaign donations. A…

9 years ago

Security Affairs newsletter Round 100 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago

German regulators ban the My Friend Cayla doll fearing it is surveillance device

German regulators have banned 'My Friend Cayla,' an internet-connected doll that can chat with our children, it can be abused…

9 years ago

A new SQL malware Targets online shops running on Magento

Security experts have discovered a new SQL malware targeting online shops running on Magento that hides the code in the…

9 years ago

Yahoo notifies users hackers are forging “cookies” to take over their accounts

Yahoo notifies users that hackers are forging "cookies" or files used in the authentication process to access their accounts, instead…

9 years ago

Russian hacker Rasputin breaches over 60 Universities and Government Agencies

The Russian-speaking black hat hacker Rasputin, hacked systems of more than 60 universities and U.S. government agencies. According to the…

9 years ago

Security Affairs newsletter Round 99 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago

Security Affairs newsletter Round 98 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

9 years ago

Last Dridex Trojan variant uses a new tactic to bypass Windows UAC

A new variant of the Dridex Trojan recently observed is leveraging a new tactic to bypass the UAC (User Account…

9 years ago

This website uses cookies.