The hacked American Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.
The Financial Times has reported that a document marked by the CIA and issued this year reveals that China is building cyber weapons with the capability to hijack enemy satellites.
The Coronavirus outbreak has triggered worldwide Cyberattacks from cybercriminals with economic motivation and state-sponsored cyber threat actors operating for cyber espionage. It is estimated that victims will be increasingly targeted with Coronavirus-themed activities, apps, websites and armed documents, reports...
"KillNet" has claimed major US airports are the targets of extensive distributed denial-of-service (DDoS) cyberattacks.
Hundreds of thousands of highly sensitive files from police departments across the world were leaked online last week. The collection, dubbed “BlueLeaks”, stems from a security breach at a Texas web design and hosting company that maintains a number...
Kevin Mitnick was not just an ordinary name in the world of hacking; he was a virtuoso, a master manipulator of computer systems, and the epitome of a cyberpunk legend. With a reputation that precedes him, Mitnick...
China's largest cyber-security vendor has published a report detailing how the CIA hacked China's critical infrastructure for over a decade. The report, authored by Qihoo 360, claims the CIA hacked targets in China's aviation industry, scientific research institutions, petroleum...
The recent arrests of Chinese spies in different states in India over the last 24-months throw up an interesting covert strategy operated by the Peoples Liberation Army (PLA) of China in espionage on India – Hawala operators running money-laundering rackets through Loan Apps and Rummy Online. This investigation by Savio Rodrigues shows how microloan apps operated by Chinese intelligence pose a National Security threat to India.
Apple reveals a security flaw that potentially gives hackers complete control of iPhones, iPads & Macs. Security professionals advise users of the iPhone 6S and subsequent versions, iPad models starting with the 5th generation and after, the iPad Pro product lines, the iPad Air 2, and Mac computers running MacOS Monterey to upgrade the affected devices. A number of iPod models are also affected.
Research found that deepfakes can fool biometric checks used by banks. Despite this obvious flaw, KYC providers don't really seem bothered about the possibility of exploitation.