Hacking

Ex-Employee Sentenced 10 Months Jail for Hacking JET2 Flights Network

A Former Jet2 employee sentenced a 10 month in Prison for carrying the cyber attack on the company network and take…

5 years ago

GALLIUM Hacking Group Attack Telecom Networks Using Publicly Available Hacking Tools & Exploiting Unpatched Vulnerabilities

Microsoft issued a warning about the new threat groups called GALLIUM that attack Telecommunication providers by exploiting the internet-facing services…

5 years ago

Infamous Lazarus APT Hackers Group Attack Mac Computers With Fileless Malware

A Researcher from K7 Labs observed a new wave of fileless malware distributed by Lazarus APT Hackers Group to infects…

5 years ago

Pwn2Own 2019 – Ethical Hackers Earned $315,000 for Hacking Galaxy S10, Xiaomi Mi9, TP-Link and Netgear WiFi Router

In this first day, Ethical hackers earned $195,000 by exploiting the vulnerabilities that reside in the different products, In the…

5 years ago

DarkUniverse – A Weaponized APT Framework Found via Interesting Script that Used in NSA Hacking Attack

Researchers found the existence of the new APT Framework named "DarkUniverse" using Tips from a script that used in the…

5 years ago

FIN7 APT Hackers Added New Hacking Tools in Their Malware Arsenal to Evade AV Detection

Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated…

5 years ago

Turla APT Hackers Using New Malware to Break The TLS Encrypted Web Traffic Communication

Turla APT threat actors distribute a new malware called Reductor, a successor of COMpfun to compromise the TLS encrypted web…

5 years ago

Students, Beware of Hacking! How to Prevent Yourself in Online From Cyber Attack

Students’ unlimited access to different information makes it quite easy to imagine that there is nothing interesting on their phones,…

5 years ago

Hackers Drop Spyware and Steal the Password, Credit card and Browers Data Using Telegram as a C2 Server

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen…

5 years ago

Autonomous Systems – Why It is Important in Your Corporate Network & How Hackers Use it

The ‘net’ in ‘internet’ stands for network. So technically it’s an internetwork—a network of computer networks. Are you confused yet?…

5 years ago