An Anonymous group just took down a fifth of the dark web
Visitors to more than 10,000 Tor-based websites were met with an alarming announcement this morning: “Hello, Freedom Hosting II, you...
Visitors to more than 10,000 Tor-based websites were met with an alarming announcement this morning: “Hello, Freedom Hosting II, you...
Customer information from more than 130,000 users of the Three mobile network has been compromised in a cyber security breach,...
Well that's not good, not good at all. The new bill will force internet companies to store their users’ browsing data...
Today was day 1 of 2 for me at BlackHat Europe 2016, one of my highlights was the tool Bloodhound ...
The Romanian hacker who first exposed Hillary Clinton's private email address is making a bombshell new claim — that he...
Now many of you that are reading this are fully aware of the wireless hacking arena. So i'm not going...
Phineas Fisher, the hacker that was behind the Hacking Team and the Gamma International breaches and data leaks, is at it again....
The FBI has managed to unlock the iPhone of the San Bernardino gunman without Apple's help, ending a court case,...
Attackers can bypass controls to distribute malware. eBay has refused to fix a major flaw in its online sales platform...
There are over 10,000 machines that are currently infected by malware in Nasa, showing that the US space agency definitely...
Asda, the second largest supermarket in the UK by market share, reportedly failed to patch a vulnerability in its online...
I wanted to make a point to someone and show how easy it is to get hacked... This is how...
Welcome back to the RedPacket Security website. An important milestone for Offensive Security has come with the first public release of...
ProtonMail, the secure encrypted email service in Switzerland have been having bad time recently. ProtonMail, an encrypted email provider, has...
In total 4% of the customer base had personal data compromised. The cyber-attack on TalkTalk was successful on a...
So it seems there is a Fitbit vulnerability involving the BlueTooth implementation that can be used to embed self replicating...
Recently, enSilo found an Advanced Persistent Threat (APT) residing in a sensitive network of a customer. This APT appears to...
The XOR DDoS botnet can generate attacks more powerful than most businesses can withstand A Linux botnet has grown so powerful...
So I have recently setup a kippo honeypot, let me show you how I setup my DMZ ready for the...
Sleepy Puppy is a XSS payload management framework that enables security engineers to simplify the...
Browsefox aka Sambreel aka Yontoo is a family of browser hijackers. When advertised they promise to “customize and enhance your...
For 2 years VW tried to hide the exploits that made its cars hack-able . Now, many might be getting...
Update flawed, new one needed for countless gadgets Google's security update to fix the Stagefright vulnerability in millions of Android...
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali...