Bithumb, Korean cryptocurrency exchange, hacked, $1 million stolen

Bithumb, an online exchange based in South Korea, has suffered a hack: a computer of one of its employees has been compromised. A customer...

China restricts popular VPN services to strengthen the Great Firewall

The Great Firewall of China is the nation's Golden Shield project, which has been effective in censoring the Internet. The government has been also...

Researchers cracked GnuPG, patch available

Security researchers succeeded at cracking libgcrypt20, GnuPG’s cryptographic core: they got their hands on the entire 1024-bit RSA key after taking an advantage of...

Motorcycle gang used stolen key data to pull multiple thefts

Around three years ago, a number of thefts hit the San Diego County. Somehow, thieves stole several Jeep Wranglers without being caught, leaving local...

British teen charged with organizing DDoS attack business

Jack Chappell, an 18-year-old student from Stockport, West Midlands, has been charged with providing DoS software to cybercriminals attacking world’s largest businesses. He appeared...

Wikileaks revealed ELSA, a Wi-Fi geo tracker

On June 28, Wikileaks opened to public documents related to ELSA, an app allegedly created by the CIA to locate the targets using open...

WordPress Statistics hit by SQL Injection vulnerability

During their vulnerability research project, experts at Sucuri Inc. have detected a SQL injection flaw in WP Statistics. The WordPress Statistics plugin enables administrators...

OutlawCountry: an alleged CIA’s Linux malware

On Thursday, June 29, Wikileaks revealed documentation, the user manual and test plan, related to the OutlawCoutry project. The whistleblower website attributes the malware...

Arbitrary code execution flaw found in systemd

A vulnerability in systemd-resolved version 223 or newer lets a malicious DNS server perform an out-of-bounds write in the memory allocated to the daemon....

EMET-like capabilities will be embedded in Windows 10

Developers will include Windows Defender Exploit Guard into The Windows 10 Fall Creators Update. The brand-new feature may also come with EMET-like features. The Enhanced...

What we do and don’t know about Petya

Petya is NotPetya The variety of Petya contaminating enterprises across the globe differs a lot from the previously known strains. As the result, Kapersky Lab,...

Islamic “hacktivists” target US government websites by using an old exploit

On June 25, 2017, a number of government websites, including official sites belonging to Ohio Governor John Kasich and Ohio First Lady Karen Kasich,...

Cybersecurity & Co: Petya targeted Ukraine’s gov’t, finance and energy sectors

Alexander Litreev is a cybersecurity specialist, web developer, and businessman from St Petersburg, Russia. By media, however, he is better known as a liberal...

Critical flaw found in older versions of Skype

Older versions of Skype are no longer reliable because of a severe vulnerability. Detected by Benjamin Kunz Mejri, a researcher from Vulnerability Laboratory, the...

Petya ransomware terrifying the world

Petya is a software nasty different from WannaCry despite the initial reports attributing the ongoing attack to the latter. However, it functions similarly: encrypting...