hack,hacker,hacker news,cybersecurity,penetration testing, hackerspace, cyberwar, cybercrime

Border Cyber Group Crypto Anarchy Telecomix Corelan Security Bruce Schneir Security Affairs Obey FilFar ippsec hackthebox hackertarget seytonic crypto hudson phrack shevirah georgia skillset eagleeye kodachi tor qubes tryhackme vmware synergetics kali offensive w3schools github malicious stackoverflow hackercombat


VECTOR NEWS - Web-Security News Items

Stuxnet-Like Viruses Remain a Top U.S. Security Risk

Another Zero Day Exposes Countless Microsoft Business Customers to Targeted Attacks

Industrial Switches from different Vendors Impaired by Similar Exposures

Al Jazeera Hunts Bangladeshi Criminals Using Their Own Israeli-purchased Spyware

North Korea Linked Konny Rat Updated Malware Aimed at Russian Targets

Another Ransomeware Gang Goes Down, Releasing Private Decryption Keys...

Supply Chain Attacks Destined to Escalate

Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years

Researchers Discover Android Surveillance Malware Built by U.S. Sanctioned Russian Firm

HTTP-Botnets: The Dark Side of a Standard Protocol!

Skynet, a Tor-powered botnet straight from Reddit

REvil Ransomware Gang Disappears from Internet

AMLBot - AML program to check crypto wallets for illicit funds

Experts Shed Light On New Russian Malware-as-a-Service Written in Rust

Ficker Infostealer Malware

Hackers Obfuscating Payloads With Exotic Programming Languages

Malware developers turn to 'exotic' programming languages to thwart researchers

Dark Web Tool That Checked For Dirty Bitcoin Shuts Down

Cybercriminals Have Built Their Own Blockchain Analytics Tool

The NSA's Plan to own the Internet

Ass Hacking: An Emerging International Cybersecurity Crisis

Op Ed on Apple's New Mass Surveillance System and It's (Supposedly) Unintended Uses

Tripwire Analyzes US Pipeline Security Issues

Exposure of Thousands of Supply Chain Networks to Hackers is Likely On the Horizon

Microsoft Exchange Server flaws inspire 30,000-plus Cyber Attacks

Government Assessment of Solar Winds Breach

FireEye Discovers Solar Winds Breach While Researching Internal Compromised Systems

Microsoft Scrutinized for Role in Solar Winds Breach

Adobe Flash Support Terminated

Zero Logon Vulnerability Exposes Windows Domain Controllers to Ransomware Attacks

Cyberattacks Targeting Triconex Industrial Control Systems' Legacy Flaws - Private Critical Infrastructure Response Weak - Warns NSA, Homeland Security

All the Ways Your Wi-Fi Router Can Spy on You

Digital Shadows Weekly Podcast Roundup Discusses Ransomware Landscape

Understanding NIST SP 800-207 - Zero Trust Security Architecture for Industrial Control Settings

International Maritime Organization Hacked

Wordpress Flaw Leverages Zerologon to attack Domain Controllers

HEH Botnet Wipes/Bricks Devices

Kraken Fileless Attack Exploits Windows Error Reporting

Attack of the Coffee Makers... lol

Chinese hackers have stolen information from Spanish laboratories working on a vaccine for COVID19, El Pais newspaper revealed

US DoJ charges Iranian hackers for attacks on US satellite companies

Russian Actors Use Fake N.A.T.O. Credentials to Hack Foreign Governments

Brighter Bulbs on the Amazon Christmas Tree - Drivers Hacking Trees for Better Routes

Who's Watching YOUR Six? Cryptocurrency Fraud By Russian Hackers..

What's the Fight Really About? U.S. Economic Warfare and Likely Foreign Defenses

The Real Scoop on Five Eyes, Nine Eyes, and 14 Eyes Surveillance Alliances

California Court Issues Chilling Ruling Concerning CFAA (Computer Fraud and Abuse Act)

Are VPN's Lying About Logs?

Homeland Security Spying on Journalists Reporting on Portland Protests

Threat Intel Feed Summary from Digital Shadows

Digital Shadows Reviews Threat Model of the Remote Worker

Zero Trust - My Paradigm Exactly - U.S. Navy Finally Graduates to the Pros

Another Zero-Day from hacktress sandboxescaper!!

Hackers Weaponizing AI

US Cyberconference AI Malware Discussion

AI Malware Considered

Business Bigwigs Fear Hackers with AI Tools

AI Malware with Superpowers...lol


Excellent Review of Current State of Cyberwarfare

Japanese Cybercrime Underground On The Rise

OOOhhh.... Hexane Moves In for the Big Kill...

Captital One Data Breach...Unknown if This Data Was Actually Leaked!

Court Blabs About NSA Hacking of Foreign Governments... Then Jails Contractor for Hacking NSA

Wired Magazine takes a look at Hacker Group APT32, aka OceanLotus

Trump Orders Cyberattack Against Iranian Missile Sites

Triada Backdoor to Root Control Built Into Android Devices at Factories

Hacker GnosticPlayers: Passwords for Sale

Hackers Get Hacked! (It's About Time....)

Assange Charged in U.S.

Intezer Gets The Scoop on Hidden Wasp Linux Malware

Germany Demands an End to Working Cryptography

China APT Activity Review from US-CERT.gov

Great Scholarly Contribution from bunnie and Ed (Snowden) on Hardware Vulnerability Mitigation

Thangrycat Harware Vulnerability Compromises Cisco Trustchain at it's Root

SeedWorm APT fortifies BlackWater phishing campaign with clever anti-detection methods

Israel Responds to Hamas Cyber Attack with Lethal Military Force

(YOUR) Instagram Private Data Dumped on Public Database

Stack OVerflow's Production Servers Hacked!

Operation ShadowHammer

Mystery Hackers Hit MegaRich Corporations

China-linked Cyber Espionage Group Targets Naval Adversaries

Israeli Prime Minister Lead Challenging Candidate Hacked By Iranian Intelligence

SimBad Malware Spreading Via Google Play Store

NSA Hacks American Router Hardware

NSA's "Boundless Informant"

Thomas Drake Comments on PRISM

Der Speigel: NSA mass surveillance of German citizens

Researchers at Microsoft warn of damages caused by cyber operations conducted by Iran-linked cyberespionage groups.

Modular Cryptojacking malware uses worm abilities to spread