state sponsored hackers

Cisco, Fortinet issue fixes against Equation Group exploits

Customers of Cisco and Fortinet security firms need to patch their products to fix the flaws exploited by the Equation…

8 years ago

A close look at the exploits leaked after the Equation Group hack

The NSA-linked unit The Equation Group has been hacked and a data dump containing exploits and tools has been leaked…

8 years ago

Snowden: NSA Equation Group hack may be the Kremlin’s warning

According to the popular whistleblower Edward Snowden the hack of the NSA Equation Group may be a Russian response to…

8 years ago

The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in…

8 years ago

Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi's…

8 years ago

DCCC website redirected donors to a fake contribution page

Another attack hit the Democratic Party organization, this time, the Democratic Party’s congressional fundraising DCCC committee was hit by hackers.…

8 years ago

Experts found a government malware on the Dark Web

Experts have made a disconcerting discovery on the Dark Web, they have found a sophisticated government malware that could be…

8 years ago

Chinese hackers target Taiwanese Opposition Party and media

Security experts at FireEye have uncovered a spear phishing campaign managed by Chinese hackers that is targeting Taiwan Opposition and…

8 years ago

Twitter warns victims of state-sponsored attacks

Twitter has notified some of its users that they may have been targeted in an attack by state-sponsored hackers. Twitter…

8 years ago

Businesses Using Millions of insecure SHA-1 Certificates

Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm.…

9 years ago

This website uses cookies.