Top of the cyber news

North Korea Stole $2 Billion for Weapons Program(August 5, 7, & 8, 2019) According to a report from Reuters, a confidential UN report says that North Korea has stolen US $2 billion from banks and cryptocurrency exchanges to fund its weapons… Read More ›

Recent Posts

  • Top of the cyber news

    North Korea Stole $2 Billion for Weapons Program(August 5, 7, & 8, 2019) According to a report from Reuters, a confidential UN report says that North Korea has stolen US $2 billion from banks and cryptocurrency exchanges to fund its weapons… Read More ›

    Advertisements
  • Just One command & hacker stole 100 million users from the Capital One’s network

    Abstract One command executed in the firewall hack allowed the intruder to gain credentials for an administrator account known as “*****WAF-Role.” This in turn enabled access to bank data stored under contract by a cloud computing company that went unnamed… Read More ›

  • Big cyber news of the week

    Capital One Breach Credit card company Capital One has acknowledged that a data breach has compromised personal information of 100 million US customers and 6 million Canadian customers. The affected data include information collected from customers at the time they… Read More ›

  • CyberSecurity: A contractor planned logic bombs to keep his services going.

    Very interesting story about a contractor who planned logic bombs in company spreadsheet so that company keeps calling the same contractor every time spreadsheet crashed. Logic Bomb: Logic bombs, unlike viruses & Trojans are a type of malware that deliberately installed,… Read More ›

  • Top cyber news

    Equifax Credit Agency will Pay As Much as $700 Million to Settle Investigations Equifax will pay as much as US $700 million to settle state and federal investigations as well as consumer claims related to the 2017 data breach that… Read More ›

  • Hacking isn’t just financial-hacking anymore.

    It would be surprising to lots of people that Hacking isn’t just about stealing money or data from companies, individuals. Hackers have reached beyond boundaries. Read the story of Nicholas FearnIt. Hacker could be your friend who is jealous of… Read More ›

  • CyberNews: Top of the News

    Defense Innovation Board Pushing Zero Trust Architecture for Military The Pentagon’s Defense Innovation Board (DIB) has approved a white paper that calls on the Department of Defense (DOD) to implement zero trust architecture (ZTA) for network access. The paper notes… Read More ›