Hacking the Tor Network: Follow Up [Updated 2020]

| | feature, Hacking
Introduction In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider... Go on to the site to read the full article ... Read More

SCADA & Security of Critical Infrastructures [Updated 2020]

Introduction Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of industrial facilities and... Go on to the site to read the full article ... Read More

Top Cybersecurity Predictions for 2020

| | Hacking
The 2020 Cybersecurity Landscape Here we are again for the annual prediction of the events that I believe will impact the cybersecurity landscape in the next year. Let’s try to imagine what threats... Go on to the site to read the full article ... Read More

Holiday Season Cybersecurity Scams and How to Avoid Them

| | Security Awareness
Holiday Season Cybersecurity Scam Awareness The holiday season has arrived, and in this period, cybercriminals intensify their operations in order to monetize shoppers’ exposure to online fraud and... Go on to the site to read the full article ... Read More
What are the risks for average users who download content via torrent?

What are the risks for average users who download content via torrent?

Introduction Today, it’s very easy to share any kind of content through simplified file-sharing services, making it easy to obtain copyrighted material and pirated copies of popular applications.... Go on to the site to read the full article ... Read More

Year in Review: Looking Back on Our Top 10 Cybersecurity Predictions for 2018, and Our Predictions for 2019!

2018 was certainly a year for cybersecurity news: high-profile hacks, ransomware attacks, cryptocurrency fluctuations and more. But now the year has ended, so it is time to check whether the... Go on to the site to read the full article ... Read More

Hackers Target Organizations in the Naval and Maritime Sectors

Introduction Companies and infrastructure within the naval and maritime sectors are under attack. In recent years, security experts have observed a growing number of attacks carried out by different... Go on to the site to read the full article ... Read More

Who Is Targeting Industrial Facilities and ICS Equipment, and How?

| | General Security
Industrial Control Systems (ICS) Equipment Under Attack Industrial Control Systems (ICS) are expected to be installed and left isolated for a long time. Technical changes and the necessity of... Go on to the site to read the full article ... Read More

CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication

| | General Security
A few days ago, security experts from IBM X-Force spotted a new strain of malware, tracked under the name CamuBot and targeting Brazilian bank customers. The malicious code immediately caught the... Go on to the site to read the full article ... Read More

CVE-2018-11776 RCE Flaw in Apache Struts Could Be Root Cause of Clamorous Hacks

| | Hacking
CVE-2018-11776 RCE in Apache Struts At the end of August, maintainers of Apache Struts released security updates for the Apache Struts 2 open-source development framework to address a critical remote... Go on to the site to read the full article ... Read More
Loading...