Tag: Hacking
-
Hackers Made Half a Million Dollars Pretending They Watched You Watch Porn
Sometimes scammers just need to say they hacked you to pull in the cash. Since July, cybersecurity researchers, journalists and victims, …
-
Hackers Leverage AWS to Breach, Persist in Corporate Networks
Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks. A new body …
-
Anonymous collective brought down Spain sites to support Catalonia
Anonymous targeted many governments websites in Spain to protest against the Government’s efforts to block Catalonia ‘s separatist …
-
Research uncovers vulnerabilities in routers from NetGear, D-Link and ZTE
New research released by reviews site TheBestVPN claims that vulnerabilities in routers from NetGear Inc., D-Link Corp. and ZTE …
-
Hackers Using Microsoft Publisher File To Deliver Dangerous FlawedAmmyy RAT Targeting Banks
A new campaign using Weaponized Microsoft Publisher File(.pub) to deliver the FlawedAmmyy RAT. The FlawedAmmyy RAT is a backdoor tool that …
-
Cybercrime isn’t going away, but hacking prosecutions are falling
Law firm RPC reports that the number of UK hacking prosecutions has dropped again: The number of computer hacking prosecutions fell for the …
-
Windows VBScript Engine Zero-day Flaw used by Darkhotel Hackers Group To Compromise Vulnerable Systems
A new zero-day exploit for Windows VBScript Engine discovered that belongs to North Korean cyber criminals gang called Darkhotel which is …
-
Three arrested in China for stealing $87M in cryptocurrency hacking campaign
Three suspects have been arrested in China on allegations they were behind the hacking theft of bitcoin and Ethereum worth $87 million …
-
Inside the British military base where young hackers learn to stop cybercrime
At the heart of a police operation to defend Britain from attack by cybercriminals, a 14-year-old boy was honing his skills to thwart …
-
PhishPoint – Hackers Uses New Phishing Technique To Steal User Credentials
A new phishing technique dubbed PhishPoint affected about 10% of Office 365 users. With the new technique, attackers used SharePoint files …
-
16-year old compromised Apple networks to steal GBs of sensitive data
Generally, Apple Inc. is believed to be very strict and reliable in matters pertaining to cyber-security. Its servers are regarded as virtually unhackable. Perhaps, this reputation is a result of the fact that Apple Inc. hasn’t suffered massive data breaches to date. …
●●●