Cyber Security Trends |24 June 19
Hello, we are talking about Florida paying 600K USD for Ransomware and Disney actress Bella Thorne posted private photos on Twitter because of a hacker blackmail. Below are the linksRead More →
Hello, we are talking about Florida paying 600K USD for Ransomware and Disney actress Bella Thorne posted private photos on Twitter because of a hacker blackmail. Below are the linksRead More →
Sources close to the best ethical hacking institute and the International Institute of Cyber Security (IICS) have confirmed that Kathryn Schrader, Gwinnett County Superior Court judge, decided to hire aRead More →
Criminals have stolen data of Titan Manufacturing and Distributing customers for almost a whole year Malicious hacker groups are attacking manufacturing companies, as reported by cybersecurity specialists from the InternationalRead More →
The suspect claimed to be annoyed by recent statements by some of those involved in leaking information According to reports of cybersecurity and digital forensics specialists from the International InstituteRead More →
The flaw was found in a completely updated system A cyber security organization researcher has publicly disclosed the details about new zero-day vulnerability present in Microsoft’s Windows operating system that could helpRead More →
Basetools underground hacking forum was breached, hackers demand a $50K ransom to avoid sharing stolen data, including admin identity, with law enforcement. A hacker that goes online with the TwitterRead More →
One of the Anonymous hackers who exposed the Steubenville High School rape case in 2012, was sentenced yesterday to two years in prison by a judge in Lexington, Kentucky. DericRead More →
Docker has patched a privilege escalation vulnerability (CVE-2016-9962) that could lead to container escapes, allowing a hacker to affect operations of a host from inside a container. The vulnerability isRead More →
The hackers have been hacked. Motherboard has obtained 900 GB of data related to Cellebrite, one of the most popular companies in the mobile phone hacking industry. The cache includesRead More →
One of the hackers who amassed a new massive army of zombie internet-connected devices that can launch disruptive cyberattacks—even by mistake—now claims to have taken control of 3.2 million homeRead More →