Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-09-28 03:00:00 |
4 times students compromised school cybersecurity (lien direct) |
>Categories: NewsTags: School
Tags: password
Tags: sticky note
Tags: lax security
Tags:
Sometimes we hear stories about brilliant students that hack their school and get celebrated, but it doesn't always end well.
(Read more...)
|
Hack
|
|
|
|
2022-08-18 10:00:00 |
(Déjà vu) Urgent update for macOS and iOS! Two actively exploited zero-days fixed (lien direct) |
>Categories: Exploits and vulnerabilitiesCategories: NewsTags: macOS
Tags: iOS
Tags: CVE-2022-32894
Tags: CVE-2022-32893
Tags: kernel privileges
Tags: WebKit
Tags: actively exploited
Tags: watering hole
Tags: exploit kit
Apple has released emergency security updates to fix two zero-day vulnerabilities previously exploited by attackers to hack iPhones, iPads, or Macs.
(Read more...)
|
Hack
|
|
|
|
2022-08-08 07:00:00 |
KMSpico explained: No, KMS is not "kill Microsoft" (lien direct) |
>Categories: ExplainedA hack tool called KMSPico is hailed as the go-to tool when it comes to activiating Windows. But is it safe?
(Read more...)
|
Hack
Tool
|
|
|
|
2020-03-25 15:00:00 |
Criminals hack Tupperware website with credit card skimmer (lien direct) |
This latest hack from Magecart threat actors was well planned and executed.
Categories:
Hacking
Tags: credit cardMagecartskimmerskimmingsteganographytupperware
(Read more...)
|
Hack
Threat
|
|
|
|
2020-02-14 17:32:10 |
Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack (lien direct) |
We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.
Categories:
Awareness
Tags: black hatscybercrimecybercrime in the moviescybercrime on TVcybersecuritycybersecurity awarenesshackhackershackinghacking movieshacking TV showsHollywoodjurassic parkmr. robotNCISpop cultureswordfishthe flashthe matrixwhite hats
(Read more...)
|
Hack
Guideline
|
|
★★
|
|
2019-03-21 15:00:00 |
Are hackers gonna hack anymore? Not if we keep reusing passwords (lien direct) |
A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
Categories:
Cybercrime
Hacking
Tags: brute forcecredential stuffingenterpriseenterpriseshackershackingpassword managerspassword sprayingreusing passwordsweak passwords
(Read more...)
|
Hack
|
|
|
|
2019-02-26 16:00:00 |
New Golang brute forcer discovered amid rise in e-commerce attacks (lien direct) |
E-commerce sites are a hot commodity these days. We dig into how compromised PCs are helping to hack into them to inject skimmers, whether via vulnerabilities in the websites themselves or through a new malware we discovered gaining entry via brute force.
Categories:
Threat analysis
Tags: BotbotnetbruteforceGolanggoogletagmanagerMagecartmagentoskimmer
(Read more...)
|
Malware
Hack
|
|
|
|
2018-12-18 16:00:00 |
All the reasons why cybercriminals want to hack your phone (lien direct) |
Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device-and what you can do to stop it.
Categories:
101
FYI
Tags: Androidappscryptomininghack your phonehackingiOSloapimining cryptocurrencyMobilemobile phonesmobile ransomwaremobile securityransomwareransomware attack
(Read more...)
|
Hack
|
|
|
|
2018-11-20 16:51:05 |
Web skimmers compete in Umbro Brasil hack (lien direct) |
In this web skimming match between two Magecart groups, there can only be one winner.
Categories:
Criminals
Threat analysis
Tags: brasilcredit cardexfiltrationhackJSONMagecartRiskIQskimmingumbroweb
(Read more...)
|
Hack
|
|
|
|
2018-09-28 19:39:01 |
Millions of accounts affected in latest Facebook hack (lien direct) |
Facebook announced earlier today that its social network had been breached, resulting in 40 million accounts that were directly impacted. Learn more as the Facebook breach story develops.
Categories:
Cybercrime
Tags: access tokensbig breachesbreachdata breachfacebookFacebook breachfacebook hackpassword resetsocial mediasocial networksView Asvulnerabilitiesvulnerability
(Read more...)
|
Hack
|
|
|