The database of Daniel’s Hosting, a now-defunct free hosting provider for dark web services, has been leaked online. The leak revealed admin passwords, emails, and other sensitive data that can help find the people behind the dark web sites and services.
Amidst the wave of public outrage following the death of George Floyd in police custody, hacktivists from Anonymous group turned their skills against the Minneapolis police department involved. The hackers have already attacked the PD’s website and promised to expose a history of crimes committed by the officers.
A hacking group linked with the Russian government has reportedly carried out a series of attacks on energy, water, and power sectors of Germany, cybersecurity-focused outlet Cyberscoop reported on May 26.
Researchers from cybersecurity firm ESET have detected a modified version of ComRAT malware, which now targets Gmail users to steal confidential documents. In addition to misappropriation of documents, the trojan collects information about the network, Microsoft Windows configurations, and the Archive Directory groups or users.
An updated version of the AnarchyGrabber trojan has begun circulating the Internet posing a threat to the communication app Discord users. The malware is reportedly geared to steal users’ passwords and tokens, disable two-factor authentication (2FA), and even spread the attack on a victim’s contacts, Bleeping Computer reported on May 24.
Hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.
There is no shortage of news about hacks and cybersecurity flaws, which may not come as a surprise. Yet, there are curious ones that catch the eye.
Having to rig someone’s landline phone and plant microphones all over their place to sniff out some secrets is now mostly the thing of vintage movies. We have voluntarily surrounded ourselves with cameras and microphones constantly connected to the internet. People upload their personal information, photos, and geolocation, show the world who their friends and […]
In order to pinpoint vulnerabilities and exploits, Facebook launches a software simulation of its own network populated exclusively by bots. The project was dubbed Web-Enabled Simulation (WES). Its white paper was published on the Facebook research site.
Conspiracy theories are diverse and sometimes rather fascinating, albeit born by enthusiastic imagination and fallacies of the human mind. While there is outright reptile-people material just a couple clicks away at any given time, some arguments may plant one or two tiny concerns even in the soberest and most pragmatic people.