Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

Level3 DDoS Outage Map
Halo Wars 2 - Blitz

binoculars looking watch outlook future

Cybersecurity Industry Outlook: 2017 to 2021

Four predictions from Cybersecurity Ventures frame the cybersecurity economy over the next five years, from 2017 to 2021.

weebly corporate logo

Weebly data breach affects 43 million customers

Weebly, a San Francisco-based company that has allowed more than 40 million people create websites with since 2007; will start sending notification letters to all of their customers on Thursday, informing them of a data breach that...

adultfriendfinder screengrab

Penthouse, Adult FriendFinder databases leak, at least 100 million accounts impacted

Databases recently obtained by LeakedSource, as well as source code, configuration files, certificate keys, and access control lists, point to a massive compromise at FriendFinder Networks Inc., the company behind...

russian police

Czech police arrest Russian hacker suspected of targeting the US

Police in the Czech Republic have arrested a Russian hacker suspected of targeting the U.S. for cyber crime.

hidden danger polaroid

Hackers hide stolen payment card data inside website product images

Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection.

careers 2

Building the DHS cybersecurity workforce

At the U.S. Department of Homeland Security (DHS), we fight against the world’s toughest cyber adversaries. Our best weapon is our people. So today, we are sharing two videos with you to help us meet this mission. They show the work...

woman iphone laptop usb

Younger consumers more likely to fall for tech support con jobs

Contrary to conventional wisdom, it's not older consumers who are most easily duped by tech support scams.


Time to destroy the hacker’s ballistic missile

A blog post for 'Enemy at the Gates' using the recent SWIFT hacking incidents to show the need for replacing conventional email technology. In addition to illustrating the cybersecurity vulnerabilities inherent in current email...

Election 2016 teaser - Republican vs Democrat

Republicans hacked, skimmed NRSC donations sent to Russian domain

Republicans who gave money to the National Republican Senatorial Committee this year, might want to check their credit card statements. Those who donated to the NRSC between March 16 and October 5, 2016, conducted their transaction on...

business man holding money bag

Yahoo shows that breach impacts can go far beyond remediation expenses

Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included...

airplane landing

Grey hats and blue skies, dealing with airline security

Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane...


Enterprises outsmarting themselves with security, while attackers easily use common techniques

Attackers use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker's Playbook, based on an analysis of nearly 4 million breach methods.

amazon prime box

Amazon resets customer passwords, while LeakedSource discloses massive update

Last weekend, and continuing on to earlier this week, Amazon sent password reset notifications to customers whose accounts were likely using recycled credentials. In somewhat related news, LeakedSource said on Tuesday they’ve added...

iot security

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages -- which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says

sandbags flood protection breach

What have we learned from the Yahoo breach?

The progressive organization represents the highest level of cybersecurity maturity and these organizations share several key qualities that help them to rise to the top when it comes to being prepared in today’s cybersecurity threat...

swift money transfer

Second group of hackers found also targeting SWIFT users

A second hacking group is also trying to rob banks by exploiting the SWIFT money transfer system, following an $81 million heist in February that used a similar approach.

open gate access

Pain in the PAM

In order to prevent security breaches, insider attacks and comply with regulatory mandates, organizations must proactively monitor and manage privileged access. As the compromise and misuse of identity is often at the core of modern...

ISAO standards organization sets guidelines for sharing information

University of Texas at San Antonio (UTSA), the Information Sharing and Analysis Organization (ISAO) Standards Organization, published four guidance documents on creating and operating an ISAO.

Load More