Fujifilm refuses to pay ransomware demand, restores network from backupsJapanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network in Japan last week and is instead relying on backups to restore operations.

read more »
19

Hackers arrested for invading Brazilian supreme court systems (source in Portuguese)Agentes cumprem três ordens de prisão temporária e cinco mandados de busca e apreensão em Goiás, São Paulo e Pernambuco

read more »
16

Learn how to program a simple Zip File password cracker, which uses a password list to brute force the encrypted file also known as a dictionary attack. The script is built using Python Programming.

Vinsloev Academy on Youtube
12
9

HOT SEAT QUESTION: Where do you fall on the Security vs. Compliance Spectrum?

Security Weekly on Youtube
10

Leak LIBC addresses from got to exploit unknown LIBC, bypassing ASLR remotely 64 bitPreviously we saw how GOT and PLT work and how to return to them to bypass ASLR and get shell on remote system but that required binary

read more »
26

The FBI takes a drastic step to fight China’s hacking spreeThe agency's approach to protecting vulnerable victims of the recent Hafnium attack manages to be at once controversial and refreshingly restrained.

read more »
24

Hacking startup 'azimuth security' unlocked the San Bernardino iPhoneMotherboard can confirm a Washington Post report that said Azimuth Security developed the tool used on the San Bernardino iPhone.

read more »
28

Google rolls out chrome 90, which defaults to HTTPS instead of HTTPStarting with Chrome 90, Google will automatically try to create an encrypted connection with any websites you visit.

read more »
25

The mechanics of the apt attack on Microsoft exchange, now available for validationMicrosoft announced that a Chinese Nation-State actor they called HAFNIUM had been utilizing four zero-day vulnerabilities on-premises version of Microsoft Exchange

read more »
18

A 'worst nightmare' cyberattack: the untold story of the SolarWinds hackRussian hackers exploited gaps in U.S. defenses and spent months in government and corporate networks in one of the most effective cyber-espionage campaigns of all time. This is how they did it.

read more »
29

New zero-day vulnerability found in google chrome, Microsoft edge: how to protect yourselfSoon after Google patched a publicly disclosed zero-day flaw in Google Chrome, another one has popped up on the Google web browser.

read more »
15

Alert fatigue - a practical guide to managing alertsWhat is alert fatigue and how can you prevent it? a practical guide

read more »
20

Insurance giant CNA Financial reportedly paid hackers $40M in ransomCNA Financial, one of the biggest insurance companies in the US, reportedly forked over $40 million in ransom after it was hit by a cyberattack in late March.

read more »
19

Malware caught using a macOS zero-day to secretly take screenshotsResearchers warned that the bug was not limited to screen recording.

read more »
13

Forenza’s ‘digital forensics’ platform can help cops catch TikTok criminalsThe subscription service scans public videos to categorize noticeable features

read more »
19

Massive cyberattack leaks credit card details, passport info of Air India passengersacross the world has been “affected” due to the cyberattack on SITA, a statement by the airline said.

read more »
16

The full story of the stunning RSA hack can finally be toldIn 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.

read more »
17

Darkside ransomware has netted over $90 million in BitcoinElliptic uses blockchain analytics to analyse Bitcoin wallets used by DarkSide to receive ransom payments from its victims over the past nine months.

read more »
15

DarkSide cybercriminal group announces its disbandmentThey handle the ransomware that shut down one of America’s largest oil pipelines. Silhouette of an anonymous hacker in the hood on the background of the binary code.

read more »
15
Level
Story XP
Story XP
Stories
Followers