News

Cyberespionage against RUAG, from Red October to Turla, who is the culprit?

Security experts from Melani published a detailed technical report about the strain of Turla…

Criminals steal $13m in three hours from ATMs across Japan

Japanese police are investigating coordinated raids across stores in Japan that resulted in the…

Lawsuit claims Facebook scanned private messages to make profits

Facebook might have violated federal privacy laws by scanning users’ private messages.Users launched a…

The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last…

Hackers can break into a facility by spending $700 on Amazon or eBay

Hackers demonstrated to the Tech Insider how to break into any office by purchasing…

Malware used in the recent banking cyber heists linked to Sony Pictures hack

Experts at the BAE security firms collected evidence that demonstrates the malware used in…

OpIcarus: Anonymous crusade against the banking industry

Anonymous alongside with BannedOffline and Ghost Squad crews are resuming the OpIcarus targeting banking…

CVE-2016-4117 Adobe Flash Zero-Day is being exploited in the wild

CVE-2016-4117 is a zero-day vulnerability affecting the Adobe Flash Player that is being exploited…

Twitter closes the access to the Intel Agencies to Analysis Service

Twitter has blocked the US intelligence agencies from accessing a service that allows the…

How a modern car thief can steal a vehicle by clicking a button

The Channel 2 journalist and Consumer Investigator Jim Strickland investigated a mysterious car theft…

CDM Featured Whitepapers

Defending Against Data Breach

Linoma

Advanced Threats In The Enterprise

EMC

Knowns & Unknowns

IKANOW