How these two women hacked into banks through an ATM and robbed millions
One of the features that has evolved the most in the world of cybercrime is the ability of hackers to compromise banking systems and spoil the security of ATMs toRead More →
One of the features that has evolved the most in the world of cybercrime is the ability of hackers to compromise banking systems and spoil the security of ATMs toRead More →
Cybersecurity specialists report the detection of four critical vulnerabilities in Hyperion Infrastructure Technology, a centralized solution for financial and operational planning in enterprise environments developed by the technology firm Oracle.Read More →
An Iran-based hacking group has spent about a year and a half operating a hacking campaign in which they pose as aerobics instructors in order to spy on and infectRead More →
Collecting information is an important phase for investigation. Now days whenever user visits any blogger websites. Many websites ask for email addresses for giving notification regarding their content. Such websitesRead More →
Cybersecurity experts report the discovery of two vulnerabilities in Zimbra, a webmail platform used by more than 200 thousand organizations worldwide. According to the report, the combined exploitation of theseRead More →
A recent report states that Justdial, one of the largest service companies in India, has suffered a data breach that led to the exposure of confidential records of more thanRead More →
After multiple reports and rumors, Transnet Port Terminals (TPT) confirmed a cyberattack that affected its entire it infrastructure. As some will recall, Transnet Group is the operator of state portsRead More →
A recent report claims that the vulnerability affecting Checkbox Survey, a tool ASP.NET to add survey functionality to websites, was exploited by a hacking group sponsored by the Chinese governmentRead More →
Cybersecurity specialists report the discovery of two critical vulnerabilities in Asterisk, a popular open source Voice over Internet Protocol (VoIP) telephony solution that provides call center functions. According to theRead More →
Cybersecurity specialists report the discovery of multiple vulnerabilities in biometric access control devices developed by French multinational IDEMIA. According to the report, successful exploitation of these vulnerabilities would allow threatRead More →