You have around 20 minutes to contain a Russian APT attack
Governments and private organisations have around 20 minutes to detect and contain a hack from Russian nation-state actors. New statistics...
Governments and private organisations have around 20 minutes to detect and contain a hack from Russian nation-state actors. New statistics...
PrivateVPN Does PrivateVPN keep any logs? The FAQ is emphatic: "No, we NEVER produce logs of any data traffic. The only things...
Locky ransomware is back, again... It's delivered with the help of new tricks to fool users and anti-malware defences. Delivered...
Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of...
The dump is relatively small, containing around 3MB of files. https://pastebin.com/L48e49AK At the end of July, anonymous hackers published documents stolen from...
The UK Government’s Department of Digital, Culture, Media and Sport (DCMS) has announced that firms could face fines of up...
Description Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations...
Have you ever done a domain password audit? Well yes the cracking of the passwords can be fun depending on...
Malware analysis is like defusing bombs. The objective is to disassemble and understand a program that was built to do...
Last weekend a security researcher publicly disclosed a zero-day vulnerability in Windows 10, Windows 8.1 and Server editions after Microsoft...
Visitors to more than 10,000 Tor-based websites were met with an alarming announcement this morning: “Hello, Freedom Hosting II, you...
As we connect more and more devices to the internet, we create more and more potential security vulnerabilities. While we’re...
Customer information from more than 130,000 users of the Three mobile network has been compromised in a cyber security breach,...
Well that's not good, not good at all. The new bill will force internet companies to store their users’ browsing data...
Day 2 at Blackhat EU 2016 and had a great day. This talk Breaking Big Data: Evading Analysis of the...
Today was day 1 of 2 for me at BlackHat Europe 2016, one of my highlights was the tool Bloodhound ...
The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking...
Yeah, thanks a lot.... in-case you can't tell its my sarcasm kicking in. After doing heavy damage to KrebsOnSecurity and...
On october 19 2016, the Dirty Cow vulnerability went public (which is kernel privilege escalation vulnerability) . From what I...
Linux running web servers appear to be at risk of a new strain of ransomware called FairWare. Three Linux administrators,...
Kelihos is one of the oldest botnets, first spotted way back in 2008, but it has managed to survive a...
It seems that the NSA has been hacked. This is being speculated after a group of hackers going by the...
From September 1, you'll need a TV licence if you stream catch-up or on-demand TV from the BBC's iPlayer service, regardless...
Everyone knows about the joint USA and Israeli malware called Stuxnet that was designed to put a halt to the...