Author Description

stevinv

Author Posts

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using…

Ironic turn … Kaspersky Labs helped NSA to catch alleged data thief

Kaspersky was a long accused to support Russian intelligence, in an ironic turn, source now revealed it…

Youngster behind massive data leak of German politicians data

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians….

ReiKey app for macOS can detect Mac Keyloggers using event taps

ReiKey is a free tool that allows to scan and detect keylogger that install persistent keyboard “event…

Dark Overlord hacking crew publishes first batch of confidential 9/11 files

The Dark Overlord published the first batch of decryption keys for 650 confidential documents related to the…

Experts analyzed the distribution technique used in a recent Emotet campaign

ESET analyzed the distribution technique used by cyber criminals in new Emotet campaign that has recently affected…

Facebook tracks non-users via Android Apps

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According…

Hackers bypassed vein based authentication with a fake hand

A couple of researchers demonstrated how to bypass vein based authentication using a fake hand build from…

Hackers target financial firms hosting malicious payloads on Google Cloud Storage

Researchers at Menlo Labs uncovered a malicious email campaign targeting employees of banks and financial services companies…

Hackers launched phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale

Amnesty International warns of threat actors that are launching phishing attacks aimed at bypassing Gmail, Yahoo 2FA…

Show Buttons
Hide Buttons