Discover how the璧合科技DSP advertising platform was compromised to include a mining script. This incident highlights the expanding scope of web-based mining attack
Discover the details of the successful overseas operation led by the Shenzhen Public Security Bureau's '321' special task force that dismantled the largest hack
Newly improved NSA leaked hacking tools can now target all versions of Windows from 2000 to Server 2016. Learn about the updated EternalSynergy, EternalRomance
A man from Washington State sues T-Mobile for failing to secure his wireless account against hackers who stole thousands of dollars worth of crypto. The case hi
The UK's information commissioner warns government agencies to focus on teenage 'bedroom hackers' rather than foreign state-backed attacks. This article discuss
British teenager hacker Lauri Love wins his case and avoids extradition to the United States after attacking U.S. government websites. Learn more about this sig
Discover how Parella, one of Google's top 250 security engineers, defends against global cyber threats and protects over a billion users. Learn about her role i
Learn about a case where a company's email account was hacked and $1.15 million was stolen through fraudulent transactions. Discover how authorities managed to
Russian citizen Levashov, accused of hacking and creating the Kelihos botnet, has been extradited from Spain to the U.S. He faces charges in Connecticut and Ala
Analyze the in-the-wild attack of Adobe Flash zero day vulnerability (CVE-2018-4878), including its exploitation techniques and potential threats. Learn about t