How to Provide Remote Incident Response During the Coronavirus Times

While the Coronavirus pandemic continues to strike chaos across the global economies, threat actors keep on launching cyberattacks on organizations from all sizes and verticals.

IR providers face a unique challenge when approached by these organizatio… Continue reading How to Provide Remote Incident Response During the Coronavirus Times

Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who’ve taken advantage of the opportunity to target victims with scams or malware campaigns.

Now, according to a new re… Continue reading Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightness of the screen, new cybersecurity research shared with The Hacker News revealed.

In recent years, several cybersecurity … Continue reading Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

Prepare for Cisco, CompTIA, and More IT Certifications with this Bundle

Exams are pretty important in professional IT. You can have all the practical knowledge in the world, but technical recruiters want to see certificates.

If you want to improve your resume, the Complete 2020 IT Certification Exam Prep Mega Bundle will … Continue reading Prepare for Cisco, CompTIA, and More IT Certifications with this Bundle

Lottery hacker gets 9 months for his £5 cut of the loot

We don’t care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities. Continue reading Lottery hacker gets 9 months for his £5 cut of the loot

Europol Shuts Down ‘Imminent Monitor’ RAT Operations With 13 Arrests

In a coordinated International law enforcement operation, Europol today announced to shut down the global organized cybercrime network behind Imminent Monitor RAT, yet another hacking tool that allows cybercriminals to gain complete control over a vict… Continue reading Europol Shuts Down ‘Imminent Monitor’ RAT Operations With 13 Arrests

A Look Into Continuous Efforts By Chinese Hackers to Target Foreign Governments

Phishing is still one of the widely used strategies by cybercriminals and espionage groups to gain an initial foothold on the targeted systems.

Though hacking someone with phishing attacks was easy a decade ago, the evolution of threat detection techn… Continue reading A Look Into Continuous Efforts By Chinese Hackers to Target Foreign Governments

Pay What You Wish — 9 Hacking Certification Training Courses in 1 Bundle

The greatest threat facing most nations is no longer a standing army. It’s a hacker with a computer who can launch a crippling cyber attack from thousands of miles away—potentially taking down everything from server farms to entire power grids with a f… Continue reading Pay What You Wish — 9 Hacking Certification Training Courses in 1 Bundle

Exclusive: German Police Raid OmniRAT Developer and Seize Digital Assets

The German police yesterday raided the house of the developer of OmniRAT and seized his laptop, computer and mobile phones probably as part of an investigation into a recent cyber attack, a source told The Hacker News.

OmniRAT made headlines in Novemb… Continue reading Exclusive: German Police Raid OmniRAT Developer and Seize Digital Assets

Commando VM — Turn Your Windows Computer Into A Hacking Machine

FireEye today released Commando VM, which according to the company, is a “first of its kind Windows-based security distribution for penetration testing and red teaming.”

When it comes to the best-operating systems for hackers, Kali Linux is always the… Continue reading Commando VM — Turn Your Windows Computer Into A Hacking Machine