Wikileaks Reveals CIA Malware that Hacks & Spy On Linux Computers

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to hack and remotely spy on computers running the Linux operating systems.

Dubbed OutlawCountry, the project allow… Continue reading Wikileaks Reveals CIA Malware that Hacks & Spy On Linux Computers

Brutal Kangaroo: CIA-developed Malware for Hacking Air-Gapped Networks Covertly

WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a tool suite – which is being used by the CIA for Microsoft Windows that targets “closed networks by air gap jumping using thumb drives,” mainly implemented in enterprises and critical infrastructures.

Air-gapped computers that are isolated from the Internet or other external networks are believed to be the

Continue reading Brutal Kangaroo: CIA-developed Malware for Hacking Air-Gapped Networks Covertly

Wikileaks Unveils ‘Cherry Blossom’ — Wireless Hacking System Used by CIA

WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices.

Dubbed “Cherry Blossom,” the framework was allegedly designed by the Central Intelligence Agency (CIA) with the help of Stanford Research Institute (SRI

Continue reading Wikileaks Unveils ‘Cherry Blossom’ — Wireless Hacking System Used by CIA

Symantec Connects 40 Cyber Attacks to CIA Hacking Tools Exposed by Wikileaks

Security researchers have confirmed that the alleged CIA hacking tools recently exposed by WikiLeaks have been used against at least 40 governments and private organizations across 16 countries.

Since March, as part of its “Vault 7” series, Wikileaks … Continue reading Symantec Connects 40 Cyber Attacks to CIA Hacking Tools Exposed by Wikileaks

WikiLeaks Reveals CIA’s Grasshopper Windows Hacking Framework

As part of its Vault 7 series of leaked documents, whistleblowing website WikiLeaks today released a new cache of 27 documents allegedly belonged to the US Central Intelligence Agency (CIA).

Named Grasshopper, the latest batch reveals a CLI-based fram… Continue reading WikiLeaks Reveals CIA’s Grasshopper Windows Hacking Framework

Wikileaks Reveals How CIA Was Hacking Your iPhones And MacBooks

As part of its “Vault 7” series, Wikileaks — the popular whistle-blowing platform — has just released another batch of classified documents focused on exploits and hacking techniques the Central Intelligence Agency (CIA) designed to target Apple MacOS and iOS devices.

Dubbed “Dark Matter,” the leak uncovers macOS vulnerabilities and attack vectors developed by a special division of the CIA

Continue reading Wikileaks Reveals How CIA Was Hacking Your iPhones And MacBooks

WikiLeaks Won’t Disclose CIA Exploits To Companies Until Certain Demands Are Met

It’s been over a week since Wikileaks promised to hand over more information on hacking tools and tactics of the Central Intelligence Agency (CIA) to the affected tech companies, following a leak of a roughly 8,761 documents that Wikileaks claimed belo… Continue reading WikiLeaks Won’t Disclose CIA Exploits To Companies Until Certain Demands Are Met

WikiLeaks Won’t Disclose CIA Exploits To Companies Until Certain Demands Are Met

It’s been over a week since Wikileaks promised to hand over more information on hacking tools and tactics of the Central Intelligence Agency (CIA) to the affected tech companies, following a leak of a roughly 8,761 documents that Wikileaks claimed belo… Continue reading WikiLeaks Won’t Disclose CIA Exploits To Companies Until Certain Demands Are Met

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files

This week WikiLeaks published “Vault 7” — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA).

The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to intercept communications and spy on its targets, making even China and Germany worried about the CIA’s ability to hack all

Continue reading 7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files