In general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information asset is the role of detection and response system. In addition,…
Read MoreIn general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information asset is the role of detection and response system. In addition,…
Read MoreThe Five Eyes alliance (New Zealand, Australia, Canada, UK and the United States) allegedly launched a takedown-level cyber attack and large-scale industrial espionage against Russia’s biggest search engine and web…
Read MoreA “denial-of-service condition” has reportedly impacted a US energy company that provides power to many western states. TechCrunch reports, “An energy company providing power in several western U.S. states experienced…
Read MoreWhen it comes to cyber attack campaigns, we are often hearing news involving a financial institution, a multinational company or a healthcare firm. Never in our typical understanding of cyber…
Read MoreA phishing campaign in which Ukraine government agencies are targeted with the RatVermin malware has been uncovered. Security researchers working with FireEye Threat Intelligence have uncovered this ongoing spear phishing…
Read MoreWe have recently featured in our news report that Singapore has successfully held their second bug bounty program, in order for the city-state to increase cybersecurity defense. The Monetary Authority…
Read MoreLast Dec 22, 2018, we have reported here in Hackercombat.com the nastly leak of the European Union COREU network that contains diplomatic cables. With that news, Cyprus, an island nation…
Read MoreTo receive email, it requires that a system is configured to reach the mail server and manually ask it for the delivery of stored emails (Post Office Protocol). However, since…
Read More500px, the popular photography app has forced all its users to reset their user passwords in a deliberate attempt to secure the remaining areas of their database. The leak included…
Read More