Cybersecurity

Hundreds of masked ICE agents doxxed by hackers, as personal details posted on Telegram

Hundreds of US government officials working for the FBI, ICE, and Department of Justice have had their personal data leaked by a notorious hacking...

I’m the Real Connor – Darknet Diaries

Full Transcript One day Connor Tumbleson got an email saying his identity has been stolen. And this was one of the...

Petya/NotPetya copycat with UEFI Secure Boot bypass

ESET Research has discovered HybridPetya, on the VirusTotal sample sharing platform. It is a copycat of the infamous Petya/NotPetya malware,...

Troy Hunt: Weekly Update 473

This week's video was recorded on Friday morning Aussie time, and as...

F5 network compromised – Sophos News

On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5 systems and exfiltrated data, including source...

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group's...

Hacktivism in 2025: what it looks like and how hashtags help analyze it

What do hacktivist campaigns look like in 2025? To answer this question, we analyzed more than 11,000 posts produced by over 120 hacktivist groups...

Heads Up: Scans for ESAFENET CDG V5

In January, a possible XSS vulnerability was found in the electronic document security management system ESAFENET CDG. This was the latest (as far as I...

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS – Krebs on Security

The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet...

BreachForums seized, but hackers say they will still leak Salesforce data

Law enforcement agencies in the United States and France have seized control of domains linked to the notorious BreachForums hacking forum, commonly used for...

Oak Cliff Swipers – Darknet Diaries

Full Transcript He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens...

A Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI...

Recent articles