A Timeline of the Ashley Madison Hack
The news about the Ashley Madison hack has broken out at a very fast pace. Keeping up with the current story can be challenging, so here is a one-stop...
Read MoreThe news about the Ashley Madison hack has broken out at a very fast pace. Keeping up with the current story can be challenging, so here is a one-stop...
Read MoreThere are times when technology becomes too ubiquitous and too accessible by the public for its own good, it becomes a favorite target of cybercriminals. Discovery of vulnerability by...
Read MoreOrganizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are devising more clever methods of fooling individuals...
Read MoreWe are covering ransomware and the latest “innovations” to improve it at the expense of the poor victims since 2017. They are always on top of their game in...
Read MoreThe network technology company, Cisco is set to pay a settlement agreement worth $8.6 million for an alleged violation of the U.S. False Claims Act (FCA). The case was...
Read MoreIt is like being hit by a bullet that we never saw coming our way. That is how we at hackercombat.com describe the controversy with regards to VxWorks embedded...
Read MoreCybersecurity measures can only be tested in two ways, the first one is something nobody wants to happen: to be tested for real, by a real cyber attack. The...
Read MoreHere in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with...
Read MoreThe probability that Lenovo has earned the infamous record for becoming a subject of the world’s biggest data breach in history is shaping-up fast. The culprit? The still online...
Read MoreThe newly discovered ransomware family targets the QNAP network attached storage (NAS) devices. This malicious program, known by security researcher Anomali as eCh0raix (identified by Trend Micro as Ransom.Linux.ECHORAIX.A),...
Read More