Hacking

Hacking | News, how-tos, features, reviews, and videos

An engineer reviews strategy framework data.
julian assange wikileaks 1

succession brain sharing intellectual knowledge sharing

How threat intelligence sharing can improve the security posture of whole industries

UBS and industry peers conduct joint cyber war games to improve security posture and incident response of the whole sector.

binary code matrix

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.

Guy Fawkes mask hidden in landscape / Anonymous / hacker / protest

9 top hacker movies and TV shows of all time

Movies and TV shows have long influenced how lawmakers and society think about information security. We all have our personal favorite we're obsessed with. What's yours?

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

What is Metasploit? And how to use this popular hacking tool

Metasploit is a widely used penetration testing tool that makes hacking way easier than it used to be. It has become an indispensable tool for both red team and blue team.

Slack logo/wordmark [2019]

Hackers use Slack to hide malware communications

A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection.

team of hackers / organized attack / group of threat actors

What is Mimikatz? And how to defend against this password stealing tool

Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets.

financ stock market skyline

Dow Jones watchlist of high-risk businesses, people found on unsecured database

A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server.

botnet bots

What is a botnet? And why they aren't going away anytime soon

A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to...

learn basics of ethical hacking

What is ethical hacking? How to get paid to break into computers

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and the certifications and training you need to become an ethical hacker.

alone at night along a dimly lit path / security / suspicious / threat / hacker

Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through...

A hooded man in a halloween mask raises a finger to his lips to encourage silence.

North Korean hackers target Russian-based companies

The North Korean Lazarus APT group is going after the Russians. Russian hackers, however, needed less than 20 minutes in 2018 to completely pwn an organization.

capture the flag hackathon face off

Top tools and resources for running a capture the flag competition

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event.

man sitting on chair on dirt road tornado overwhelmed overworked stressed disruption disaster recov

Disastrous cyber attack on email provider wipes US servers and backups

A cyber attack on email provider VFEmail caused “catastrophic destruction,” with hackers wiping the servers and backups.

man in the middle phone on a string communicaiton

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

xiaomi m365 scooter

Popular electric scooters can be remotely hacked

Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate.

07 surveys

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging.

security threats and vulnerabilities

What is an advanced persistent threat (APT)? And 5 signs you've been hit with one

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

Security flaws in baby cam monitors

Hijacked Nest devices highlight the insecurity of the IoT

Internet of Things (IoT) devices, such as Nest cameras and thermostats, continue to be hacked. To prevent that, follow smart password practices and turn on 2FA.

Load More
You Might Also Like