Archive
A years ago when the mysterious hacking group ‘The Shadow Brokers’ dumped a massive trove of sensitive data stolen from the US intelligence agency NSA, everyone started looking for secret hacking tools and zero-day exploits. A group of Hungarian security
Threat intelligence feeds are third-party streams of indicators or artifacts, with the singular goal of learning from other organizations’ access and visibility to improve your own threat awareness and response. Functionally, threat intelligence feeds are almost inevitably delivered online, and
The security of tens of thousands of websites is in question after the CEO of a company that sells HTTPS certificates included the private keys for 23,000 customers in an email—an apparent attempt to force a revocation of the customers’
Telecom giant Swisscom Wednesday disclosed that an unauthorised intruder misappropriated an unnamed sales partner’s access to its data, thereby compromising basic information pertaining to approximately 800,000 customers. In a 7 February press release, the £8.4 billion Switzerland-based company acknowledged that
Interpol warns IoT devices at risk
Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device – from refrigerators to smartphones – is vulnerable to attack. As attacks proliferate, law enforcement struggles to keep
wnedList, a website that tells people when their website has been pwned and their sensitive credentials leaked online, has announced it will shut down on May 16, 2016. The news comes after journalist Brian Krebs informed the company of a