Aptly timed. Two words that sum up this attack by Iranian hackers on US cyberspace, with rising tensions between the United States and Iran. A couple of days ago, the website for the Federal Depository Library Program (FDLP) was defaced by hackers based in Iran, shortly after the killing of Qassem Suleimani in...Continue Reading
Just to have an overview of what exactly a cheap PC might be like – Raspberry Pi is a teeny-tiny device that can be tinkered with to gain deceptively high capabilities. This was demonstrated by a most recent report which confirmed that a NASA lab was hacked using a Raspberry Pi. The alleged data...Continue Reading
A group of attackers are actively exploiting a critical vulnerability in Atlassian’s Confluence collaboration software to inject trojans and infect servers with the GandCrab ransomware. Confluence is a Java-based web application that provides a shared wiki-type workspace for enterprise employees and is used by tens of thousands of companies worldwide. The vulnerability, tracked as CVE-2019-3396,...Continue Reading
Authorities were investigating the online posting by hackers on Saturday. The personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy. Cyber Security Researchers counted at least 1,400 unique records of employees of the FBI, Secret Service, Capitol Police, U.S. Park Police and...Continue Reading
Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard to detect bruteforcing mechanism. A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise. It...Continue Reading
Docker Hub was just attacked! More than 190K user accounts may have been exposed. Docker Hub discovered the unauthorized access to a single Hub database On Thursday, April 25th, 2019. The accessed data includes usernames, passwords, Github and Bitbucket tokens for Docker auto builds. Dockers confirm that only non-financial user data is affected. Docker...Continue Reading
A couple from Texas were given the shock of their life this week when they say they heard a man’s voice coming from their baby monitor and threatening to kidnap their four-month-old son. Nathan and Ellen Rigney were sleeping just before midnight on Monday when they heard a beeping sound coming from their Nest-brand...Continue Reading
Risks when an operation gets disrupted How much does it affect a business no matter what size whenever its operations get disrupted? Huge sums of money, time, effort, and most of all the data that are involved in the operations of the business. Consumer confidence? A plunge in the stakeholders confidence? How dangerous? Ransomware in...Continue Reading
The latest round of leaked data sold by a famous dark web netizen was noticed by The Hacker News, who already made three separate releases in different time intervals of leaked data in a Dark Web sales and marketplace. While the dark web monitoring mode is consistent, with the large hidden services and contents lurking...Continue Reading
Malicious cyber criminals have just utilized a Canadian college’s system to do a huge cryptojacking effort. Nova Scotia’s St. Francis Xavier University found the assault a week ago and handicapped its system to remove the assault. The programmers allegedly introduced a malware to direct the assault. In a statement released on Nov. 4, the...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.