Archive

A years ago when the mysterious hacking group ‘The Shadow Brokers’ dumped a massive trove of sensitive data stolen from the US intelligence agency NSA, everyone started looking for secret hacking tools and zero-day exploits. A group of Hungarian security

Threat intelligence feeds are third-party streams of indicators or artifacts, with the singular goal of learning from other organizations’ access and visibility to improve your own threat awareness and response. Functionally, threat intelligence feeds are almost inevitably delivered online, and

The security of tens of thousands of websites is in question after the CEO of a company that sells HTTPS certificates included the private keys for 23,000 customers in an email—an apparent attempt to force a revocation of the customers’

Telecom giant Swisscom Wednesday disclosed that an unauthorised intruder misappropriated an unnamed sales partner’s access to its data, thereby compromising basic information pertaining to approximately 800,000 customers. In a 7 February press release, the £8.4 billion Switzerland-based company acknowledged that

Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device – from refrigerators to smartphones – is vulnerable to attack. As attacks proliferate, law enforcement struggles to keep

wnedList, a website that tells people when their website has been pwned and their sensitive credentials leaked online, has announced it will shut down on May 16, 2016. The news comes after journalist Brian Krebs informed the company of a