Over 13,000 iSCSI storage clusters are currently accessible through the internet after their respective owners forgot to enable authentication. The new attack vector opens the backdoor inside enterprise disk storage arrays and peoples NAS devices. ISCSI stands for Internet Small… Read More
Think your data and personal information is safe on your universities network? Think again.
It only took hackers two hours to break into the university networks through phishing emails to gain administrator access and see your personal data, financial information and confidential research. These ethical hackers were testing the security of university networks where… Read More
Microsoft paid out over $2m in 2018 to their bug bounty program and looking to increase that number this year.
The Microsoft Bounty Program is being overhauled now that they’ve seen the growth in the program, awarding researchers over $2m in 2018 alone. HackerOne will be taking over the payment-processing part the bug bounty program and they are promising that… Read More
FIN6 Cybercrime group is moving on from malware and upgrading to ransomware.
FIN6 is primarily known for hacking retailers and stealing payment card details from (POS) point-of-sale systems has changed their targets and now planning to deploy ransomware on infected networks. FIN6 is widely known in the cyber-security field as being the… Read More
The Heath Robinson codebreaking machine from WW2 has been reconstructed after a seven year project.
A team of six working together has completely restored the Heath Robinson at the National Museum of Computing. This machine was initially built to try and automate code-cracking but the process was very complex. With just a few photographs and… Read More