The United States military has publicly disclosed that it launched a cyber attack against Russia’s Federal News Agency (FAN), the news website arm of the Russian Internet Research Agency (IRA)….
Read MoreThe United States military has publicly disclosed that it launched a cyber attack against Russia’s Federal News Agency (FAN), the news website arm of the Russian Internet Research Agency (IRA)….
Read MoreLast Dec 22, 2018, we have reported here in Hackercombat.com the nastly leak of the European Union COREU network that contains diplomatic cables. With that news, Cyprus, an island nation…
Read MoreCybercriminals love to target institutions that either holds a lot of personal information or lots of money with weak security. Of course, the mainstream banks have a lot of money…
Read MoreCurrently, we live in the era of digital transformation, where the logic of business and, above all, information has migrated to digital media, which implies a greater challenge for organizations…
Read MoreAccording to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is likely to see an increase of state actors taking aim at…
Read MoreDailymotion, the rival to Youtube’s video-sharing empire, has become a victim of a cyber attack called credential stuffing. It is an attack using the usernames and passwords from other data…
Read MoreCybersecurity experts have warned that the massive data breach that might be the biggest ever posted on the internet is just the beginning. The trove of sensitive information that was…
Read MoreMany WordPress websites have come under attack via a zero-day flaw in an abandoned plugin. The “Total Donations” plugin, which was earlier used by many WordPress website owners, has now…
Read MoreEight members of the Ohio National Guard have been called in to help an attempted cyber-attack on the city of Akron’s computer servers. Akron asked Gov. Mike DeWine on Friday…
Read MoreHow can cybercriminals penetrate a network or computer if there are security software in place to prevent it? Some cyber criminals have the answer, attack the very software used for…
Read More