Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers

The Israel Defense Force (IDF) claims to have neutralized an “attempted” cyber attack by launching airstrikes on a building in Gaza Strip from where it says the attack was originated.

As shown in a video tweeted by IDF, the building in the Gaza Strip,… Continue reading Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers

Pre-Installed Software Flaw Exposes Most Dell Computers to Remote Hacking

If you use a Dell computer, then beware — hackers could compromise your system remotely.

Bill Demirkapi, a 17-year-old independent security researcher, has discovered a critical remote code execution vulnerability in the Dell SupportAssist utility tha… Continue reading Pre-Installed Software Flaw Exposes Most Dell Computers to Remote Hacking

WikiLeaks’ Julian Assange Sentenced to 50 Weeks in UK Jail

WikiLeaks founder Julian Assange has been sentenced to 50 weeks—for almost a year—in prison by a London court for breaching his bail conditions in 2012 and taking refuge in the Ecuadorian embassy for nearly 7 years.

The 47-year-old Assange was arreste… Continue reading WikiLeaks’ Julian Assange Sentenced to 50 Weeks in UK Jail

DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days

In recent years, we have seen how hackers prey on those too lazy or ignorant to install security patches, which, if applied on time, would have prevented some devastating cyber attacks and data breaches that happened in major organisations.

The United… Continue reading DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days

Hackers Found Exploiting Oracle WebLogic RCE Flaw to Spread Ransomware

Taking advantage of newly disclosed and even patched vulnerabilities has become common among cybercriminals, which makes it one of the primary attack vectors for everyday-threats, like crypto-mining, phishing, and ransomware.

As suspected, a recently-… Continue reading Hackers Found Exploiting Oracle WebLogic RCE Flaw to Spread Ransomware

Rapidly Growing Electrum Botnet Infects Over 152,000 Users; Steals $4.6 Million

An ongoing attack against Electrum Bitcoin wallets has just grown bigger and stronger with attackers now targeting the whole infrastructure of the exchange with a botnet of over 152,000 infected users, raising the amount of stolen users’ funds to USD 4… Continue reading Rapidly Growing Electrum Botnet Infects Over 152,000 Users; Steals $4.6 Million

‘Highly Critical’ Unpatched Zero-Day Flaw Discovered In Oracle WebLogic

A team of cybersecurity researchers today published a post warning enterprises of an unpatched, highly critical zero-day vulnerability in Oracle WebLogic server application that some attackers might have already started exploiting in the wild.

Oracle … Continue reading ‘Highly Critical’ Unpatched Zero-Day Flaw Discovered In Oracle WebLogic

Facebook Could Be Fined Up To $5 Billion Over Privacy Violations

Facebook expects to face a massive fine of up to $5 billion from the Federal Trade Commission (FTC) as the result of an investigation into its privacy policies—that’s about one month’s revenue for the social media giant.

To be clear the amount of fine… Continue reading Facebook Could Be Fined Up To $5 Billion Over Privacy Violations

Congress Asks Google 10 Questions On Its Location Tracking Database

U.S. Congress has sent an open letter to Google CEO Sundar Pichai asking for more information about its Sensorvault database that’s reportedly being used by law enforcement agencies to solve crime cases.

Last week, we reported a story based upon NY Ti… Continue reading Congress Asks Google 10 Questions On Its Location Tracking Database

Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform

A cybersecurity professional today demonstrated a long-known unpatched weakness in Microsoft’s Azure cloud service by exploiting it to take control over Windows Live Tiles, one of the key features Microsoft built into Windows 8 operating system.

Intro… Continue reading Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform