The cyberactivism has a new anonymous face According to Salvador Ruiz, network security specialist from the International Institute of Cyber Security, Distributed...
Cyberactivists have announced the release of a massive archive with leaked information from Russian oligarchs and journalists According to network security and...
The US Justice Department has accused China to be involved in industrial espionage. According to a press release from the department, the Chinese government...
Federal agencies claim that in this hacking campaign 13 firms were attacked for the benefit of a Chinese aerospace company Last Tuesday,...
When the Spectre and Meltdown security flaws in Intel chips were disclosed earlier this year, security researchers called it a loophole so...
It’s no longer necessary to run attacker code on the victim system. When the Spectre and Meltdown attacks were disclosed earlier this year, the...
What is this dumpster diving tool you speak of? The creator of this tool has given us an exclusive insight. LHN have...
Israeli authorities have arrested a 38-year-old man for allegedly stealing secrets of the NSO Group, a Herzliya-based firm that specializes in developing spyware and...
The security researchers at ESET have uncovered InvisiMole: a spyware that has been active at least since 2013. The company’s security products...
The US Justice Department charged nine Iranian nationals with allegedly hacking on behalf of Islamic Revolutionary Guard Corps (a branch of Iran’s...
The APT15 hacking group has always been associated with Chinese intelligence and it has been part of quite a few, infamous hacking...
In modern Intel processors, there’s a hardware extension available named Software Guard Extension (SGX) to improve the security aspects. It provides a...
Felismus malware deployed to steal documents and carry out surveillance on government foreign policy in a previously unknown campaign. A previously unknown...
Do you know—United States Government has banned federal agencies from using Kaspersky antivirus software over spying fear? Though there’s no solid evidence...
NSA is one of the world’s most powerful government agencies. But that doesn’t mean it’s immune from different security threats and hacking...
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse...
Religious beliefs, political leanings, and medical conditions are up for grabs. OAKLAND, Calif.—In the beginning, people hacked phones. In the decades to...
ThyssenKrupp, one of the world’s major steel makers, has said it has fallen victim to a “professional” hacking attack, with the intent...
Short Bytes: One of the biggest data breaches on the Friend Finder Network has compromised the details of 412 million users across...
French naval contractor DCNS said on Wednesday it may have been the victim of “economic warfare” after secrets about its Scorpene submarines...
Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shownhow to discover and...