Clop ransomware gang leaks data allegedly stolen from cybersecurity firm Qualys

Cybersecurity firm Qualys seems to have suffered a data breach, threat actors allegedly exploited zero-day flaw in their Accellion FTA server. Cybersecurity firm Qualys is the latest victim of a cyber attack, the company was likely hacked by threat actors that exploited a zero-day vulnerability in their Accellion FTA server. A couple of weeks ago, security experts […]

Focus On: 30 Most Popular Hacking in the 2010S: WannaCry ransomware Attack, ICloud leaks of celebrity Photos, Stuxnet, OurMine, The Shadow Brokers, Vault … Madison data Breach, Guccifer 2.0, etc.

Focus On: 30 Most Popular Hacking in the 2010S: WannaCry ransomware Attack, ICloud leaks of celebrity Photos, Stuxnet, OurMine, The Shadow Brokers, Vault … Madison data Breach, Guccifer 2.0, etc. This carefully crafted ebook is formatted for your eReader with a functional and detailed table of contents. The Focus On books are made out of […]

Leaks and breaches: a roundup

It’s time for one of our semi-regular breach/data exposure roundup blogs, as the last few days have brought us a few monsters. If you use any of the below sites, or if you think some of your data has been sitting around exposed, we’ll hopefully give you a better idea of what the issue is. […]

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

And using browser privacy extensions may just make matters worse Boffins from Graz University of Technology in Austria have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware to fingerprint browsers and improve the effectiveness of exploits.… The Register – Security

RAMBleed picks up Rowhammer, smashes DRAM until it leaks apps’ crypto-keys, passwords, other secrets

Boffins blast boards to boost bits Bit boffins from Australia, Austria, and the US have expanded upon the Rowhammer memory attack technique to create more dangerous variation called RAMBleed that can expose confidential system memory.… The Register – Security