Hacking news, information, and how-to advice

2016 audi sportback e tron graffiti wall

Car hackers find remotely exploitable vulnerabilities in Volkswagen and Audi vehicles

Researchers discovered flaws in the Audi A3 Sportback e-tron and the Volkswagen Golf GTE that make the vehicles vulnerable to remote hacking.

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

security threats and vulnerabilities

5 signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

group silhouette filled with binary code

SamSam explained: Everything you need to know about this opportunistic group of threat actors

The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.

russian military

Russia is hacking routers in global cyber attacks, US and UK warn

In a first-of-its-kind advisory, the U.S. and U.K. warned of malicious cyber activity by state-sponsored Russian hackers who are targeting network infrastructure devices.

cyber attack

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.

whyhpcmatters frauddetection 1000

Cross-channel fraud detection

How performing behavioral analysis across silos can help detect sophisticated attacks.

balint seeber bastille SirenJack

SirenJack: Hackers can hijack emergency alert sirens with a $35 radio and laptop

Emergency alert systems manufactured by Acoustic Technology Inc. can be hijacked and made to play any audio thanks to a vulnerability dubbed SirenJack.

ransomware breach hackers dark web

Ransomware incidents double, threatening companies of all sizes

Ransomware is the most common malware used when it comes to breaches, according to Verizon’s 2018 Data Breach Investigations Report.

US Flag

Hackers abused Cisco flaw to warn Iran and Russia: 'Don't mess with our elections'

Hackers exploited a flaw in Cisco Smart Install Client in a cyber attack against Iran and Russia, enabling them to leave the US flag and 'Don't mess with our elections' on screens.

security vulnerabilities such as hackers and cyberattacks

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.

Election 2016 teaser - Electronic voting security

Voting machine vendor firewall config, passwords posted on public support forum

"This is gold" for a nation-state attacker that wanted to hack an election.

CSO slideshow - Insider Security Breaches - Weak link breaks among a larger chain in a network

What happens when half the nation's information gets stolen?

The Equifax data breach exposed personal account data for nearly half of all adult Americans. Now that it’s in the hands of criminals, we need to reconsider traditional approaches to financial identity verification.

digital money - binary code

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

framework metal

What is Mitre's ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats.

artificially intelligent, robotic worker

Reducing the impact of AI-powered bot attacks

Fraudsters are harnessing AI to behave like humans, trick users and scale-up attacks.

a hooded figure targets a coding vulnerability

Saks, Lord & Taylor hacked; 5 million payment cards compromised

Hackers managed to lurk on the network of Saks Fifth Avenue, Saks Off 5th, and Lord & Taylor for nearly a year and steal the payment card data of 5 million customers.

fragile binary cyberattack risk vulnerable

4 main reasons why SMEs and SMBs fail after a major cyberattack

The challenges SMEs and SMBs face and what to do about them.

ermergency reponse siren

Baltimore's 911 dispatch hacked, CAD system down for 17 hours

Baltimore’s 911 dispatch system was hacked over the weekend, causing the Computer Aided Dispatch (CAD) system to be down for over 17 hours.

online hacker

Testing the waters: The value of ethical hacking for business

Why bug bounty programs are on the rise

Load More