'Silence' hackers hit banks in Bangladesh, India, Sri Lanka, and Kyrgyzstan

‘Silence’ hackers hit banks in Bangladesh, India, Sri Lanka, and Kyrgyzstan

A group of hackers specialized in attacking banks has hit again, and this time they’ve breached four targets in Asia, respectively in Bangladesh, India, Sri…

View More ‘Silence’ hackers hit banks in Bangladesh, India, Sri Lanka, and Kyrgyzstan
Hacktivist Attacks Dropped By 95% Since 2015

Hacktivist Attacks Dropped By 95% Since 2015

Threat intelligence analysts have long said that hacktivism was dead but new data published by IBM X-Force today confirms the complete collapse of hacktivism scene,…

View More Hacktivist Attacks Dropped By 95% Since 2015
Hacker leaks database of dark web hosting provider

Hacker leaks database of dark web hosting provider

A hacker has leaked online today the database of Daniel’s Hosting (DH), the largest free web hosting provider for dark web services. The leaked data…

View More Hacker leaks database of dark web hosting provider
Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

The aircraft safety system known as the Traffic Alert and Collision Avoidance System (TCAS) can be coerced into sending an airplane on a mid-air rollercoaster…

View More Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems
Email spoofing explained: Who does it and how?

Email spoofing explained: Who does it and how?

Email spoofing definition Email spoofing is forging email so it looks like it came from someone it didn’t. I learned to spoof email in the…

View More Email spoofing explained: Who does it and how?
Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic

Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic

Since at least early December 2019, a mysterious hacker group has been taking over DrayTek enterprise routers to eavesdrop on FTP and email traffic inside…

View More Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic
How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer

John Strand breaks into things for a living. As a penetration tester, he gets hired by organizations to attack their defenses, helping reveal weaknesses before…

View More How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer
The Risk of “Credential Stuffing” to the Smart Home

The Risk of “Credential Stuffing” to the Smart Home

As technology advances and the costs of connecting electronic components to the internet decreases, the cost of having a connected “smart home” also decreases. Sensors…

View More The Risk of “Credential Stuffing” to the Smart Home
Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers

Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers

Industrial control systems in manufacturing, energy, chemical and other environments are coming under an increasing number of cyber attacks, as hacking groups of all kinds…

View More Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers
Jeff Bezos’ phone was reportedly hacked by Saudi Crown Prince

Jeff Bezos’ phone was reportedly hacked by Saudi

Amazon CEO Jeff Bezos was reportedly hacked by Saudi Arabia Crown Prince Mohammed bin Salman in 2018, according to a new bombshell report from the Guardian’s…

View More Jeff Bezos’ phone was reportedly hacked by Saudi