Hacking the Tor Network: Follow Up [Updated 2020]
Introduction In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider... Go on to the site to read the full article ... Read More
SCADA & Security of Critical Infrastructures [Updated 2020]
Introduction Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of industrial facilities and... Go on to the site to read the full article ... Read More
Top Cybersecurity Predictions for 2020
The 2020 Cybersecurity Landscape Here we are again for the annual prediction of the events that I believe will impact the cybersecurity landscape in the next year. Let’s try to imagine what threats... Go on to the site to read the full article ... Read More
Holiday Season Cybersecurity Scams and How to Avoid Them
Holiday Season Cybersecurity Scam Awareness The holiday season has arrived, and in this period, cybercriminals intensify their operations in order to monetize shoppers’ exposure to online fraud and... Go on to the site to read the full article ... Read More
What are the risks for average users who download content via torrent?
Introduction Today, it’s very easy to share any kind of content through simplified file-sharing services, making it easy to obtain copyrighted material and pirated copies of popular applications.... Go on to the site to read the full article ... Read More
Year in Review: Looking Back on Our Top 10 Cybersecurity Predictions for 2018, and Our Predictions for 2019!
2018 was certainly a year for cybersecurity news: high-profile hacks, ransomware attacks, cryptocurrency fluctuations and more. But now the year has ended, so it is time to check whether the... Go on to the site to read the full article ... Read More
Hackers Target Organizations in the Naval and Maritime Sectors
Introduction Companies and infrastructure within the naval and maritime sectors are under attack. In recent years, security experts have observed a growing number of attacks carried out by different... Go on to the site to read the full article ... Read More
Who Is Targeting Industrial Facilities and ICS Equipment, and How?
Industrial Control Systems (ICS) Equipment Under Attack Industrial Control Systems (ICS) are expected to be installed and left isolated for a long time. Technical changes and the necessity of... Go on to the site to read the full article ... Read More
CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication
A few days ago, security experts from IBM X-Force spotted a new strain of malware, tracked under the name CamuBot and targeting Brazilian bank customers. The malicious code immediately caught the... Go on to the site to read the full article ... Read More
CVE-2018-11776 RCE Flaw in Apache Struts Could Be Root Cause of Clamorous Hacks
CVE-2018-11776 RCE in Apache Struts At the end of August, maintainers of Apache Struts released security updates for the Apache Struts 2 open-source development framework to address a critical remote... Go on to the site to read the full article ... Read More

