Hackers Threaten to Take Down Steam as Summer Sale Begins
“We are attacking Steam and we will attack all the servers”. Valve officially kicked off the Steam Summer Sale on June 22, and just like every year, the gaming platformRead More →
“We are attacking Steam and we will attack all the servers”. Valve officially kicked off the Steam Summer Sale on June 22, and just like every year, the gaming platformRead More →
Despite being an expanding threat, ransomware infections are rarely reported to law enforcement agencies, according to conclusions from the 2016 Internet Crime Report, released yesterday by the FBI’s Internet CrimeRead More →
How to hijack hundreds of HTTP connections for the modest price of $60 (VPS included) Because not everyone has QUANTUM capabilities, a poor man’s gotta think about ways of gettingRead More →
Van Eck phreaking getting surprisingly cheap. Sideband attacks that monitor a computer’s electromagnetic output to snaffle passwords are nothing new. They usually require direct access to the target system andRead More →
British police announced today they arrested two suspects part of an international group that hacked into Microsoft’s network. The two suspects are a 22-year-old man from Lincolnshire and a 25-year-oldRead More →
Another major exploit kit (EK) looks like it’s heading for the EK graveyard as activity from the RIG EK has fallen to less than 25% of what the exploit kitRead More →
Security experts have discovered a method of bypassing Windows PatchGuard protections and hooking malicious code into the Windows kernel, which allows an attacker to plant rootkits on systems previously thoughtRead More →
Drupal team released security updates to fix several vulnerabilities, including the critical access bypass flaw CVE-2017-6922 exploited in spam campaigns. The Drupal development team has released security updates to fixRead More →
The three vulnerabilities allow attackers to disarm the platform and execute code. Symantec has patched three vulnerabilities in the Symantec Messaging Gateway (SMG) which could be exploited by attackers toRead More →
WikiLeaks dumped today the manuals of several hacking utilities part of Brutal Kangaroo, a CIA malware toolkit for hacking into air-gapped (offline) networks using tainted USB thumb drive. According toRead More →