“Quiet Skies” – A TSA Surveillance Program Targets Ordinary U.S. Citizens

Here we are once more to discuss another surveillance program that could threaten the privacy of U.S. citizens. This time, our topic is the previously-undisclosed “Quiet Skies” program.... Go on to the site to read the full article ... Read More

Leaders’ Meetings: A Privileged Target for Hackers

| | Hacking
Leaders’ meetings are privileged targets for nation-state attackers that launch massive offensives to gather intelligence from the ongoing events. Let’s analyze together what has happened... Go on to the site to read the full article ... Read More
How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How much does a data breach cost? It isn’t a simple question, but the answer is the only way to transmit the urgency of the situation to C-level executives. The 2018 Cost of a Data Breach... Go on to the site to read the full article ... Read More
The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case

The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case

| | Hacking
Introduction In the past, we’ve reported many cases of cyberattacks against companies operating in the gaming industry. We observed many attacks, especially DDoSing, against the infrastructure... Go on to the site to read the full article ... Read More
Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns

Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns

| | Phishing
In the last couple of years, crooks devised several techniques to bypass anti-phishing filters, let’s analyze them to understand the way threat actors used them to bypass Office 365... Go on to the site to read the full article ... Read More
Mirai botnet evolution since its source code is available online

Mirai botnet evolution since its source code is available online

Mirai – The evolving IoT threat Since the release of the source code of the Mirai botnet, crooks have improved their own versions by implementing new functionalities and by adding new exploits. A... Go on to the site to read the full article ... Read More

The VPNFilter: A Powerful Botnet of More Than 500k Devices Ready to Attack

VPNFilter botnet – The discovery Security researchers at Talos group, along with colleagues from other cybersecurity firms and law enforcement agencies, have discovered a huge botnet composed... Go on to the site to read the full article ... Read More

GDPR Provides Scammers with a New Golden Opportunity

| | Phishing
GDPR latest: Fraudsters posing as banks in data protection emails phishing scam The EU General Data Protection Regulation (GDPR) has arrived, and crooks are ready to exploit the media attention on... Go on to the site to read the full article ... Read More

The Rowhammer – the evolution of a dangerous attack over the years

The Rowhammer attack Back in 2015, security researchers at Google’s Project Zero team demonstrated how to hijack an Intel-compatible PCs running Linux by exploiting the physical weaknesses in... Go on to the site to read the full article ... Read More

Hacking communities in the Deep Web

Introduction The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they are... Go on to the site to read the full article ... Read More
Loading...