More Than 1 Million Google Accounts Breached by Gooligan
As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breachedRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breachedRead More →
864 cases this year in the UK; true figure is likely much higher. The number of reported webcam blackmail cases has more than doubled in the past year, and atRead More →
Security expert discovers flaw in Windows 10 in-place upgrade system that gives hackers admin rights. Getting administrator privileges on a Windows 10 computer no longer requires complex tactics and malware,Read More →
Benjamin Dumke-von der Ehe found an interesting way to steal data cross domain. Using JS proxies he was able to create a handler that could steal undefined JavaScript variables. ThisRead More →
The Kangaroo ransomware is the latest ransomware from the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda. What makes this version stand out a bit more is the use ofRead More →
The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, “You Hacked. ALL Data Encrypted.” Turns out, theRead More →
Researchers detect barrage of exploits targeting potentially millions of devices.Online criminals—at least some of them wielding the notorious Mirai malware that transforms Internet-of-things devices into powerful denial-of-service cannons—have begun exploitingRead More →
On Oct. 27 of this year, a contractor told the US Navy that one of its employee’s laptops was “compromised,” resulting in the theft of personal data, including social securityRead More →
Bounty hunter Kevin Roh has discovered several security vulnerabilities in the Uber UberCENTRAL Tool that exposed user data. Security expert and bounty hunter Kevin Roh has discovered several security vulnerabilities in Uber’s UberRead More →
The technical nature of cyber crime can sometimes obscure the fact that creating, using, and distributing malware, phishing kits and other threats is a business, albeit an illegitimate one. LikeRead More →