Category: Uncategorized


The APT34 Glimpse project is maybe the most complete APT34 project known so far, the popular researcher Marco Ramilli analyzed it for us.

Continue reading

Defendant and Co-conspirators Hacked into Computer Systems of Tax Preparation Companies and Stole Personal Information of Identity Theft Victims

Continue reading

Ladders, one of the most popular job recruitment sites in the U.S. specializing in high-end jobs, has exposed more than 13.7 million user records following a security lapse. Continue reading

In April 2019, several new exploits targeting SAP business applications were released in a public forum. Although the exploits target insecure configurations that have been reported by SAP SE and Onapsis in the past, their public release significantly increases the risk of successful cyber attacks against SAP implementations globally. Continue reading

A vulnerability in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user. Continue reading

  • Two prolific dark web marketplaces have been taken down in simultaneous global operations, supported by Europol: the Wall Street Market and the Silkkitie (known as the Valhalla Marketplace)

Continue reading

While the carrier says the issues found in 2011 and 2012 were resolved at the time, the revelation may further damage the reputation of a Chinese powerhouse.

Continue reading

Storing passwords in plain text and harvesting email contacts have landed the firm in hot water — again. Continue reading

The cyber-attack was first detected on 15 March 2019, when state-of-the-art security monitoring tools detected suspicious activity on Amnesty International Hong Kong’s local IT systems. Cyber security experts took immediate action to protect the systems and to commence an investigation into the attack. Continue reading

Western countries are increasingly calling out malicious cyber activity by other nation states, and this naming and shaming can deter attacks and spur potential victims into improving their security planning, according to intelligence chiefs. Continue reading