The United States military has publicly disclosed that it launched a cyber attack against Russia’s Federal News Agency (FAN), the news website arm of the Russian Internet Research Agency (IRA)….
Read More
The United States military has publicly disclosed that it launched a cyber attack against Russia’s Federal News Agency (FAN), the news website arm of the Russian Internet Research Agency (IRA)….
Read More
Last Dec 22, 2018, we have reported here in Hackercombat.com the nastly leak of the European Union COREU network that contains diplomatic cables. With that news, Cyprus, an island nation…
Read More

Cybercriminals love to target institutions that either holds a lot of personal information or lots of money with weak security. Of course, the mainstream banks have a lot of money…
Read More
Currently, we live in the era of digital transformation, where the logic of business and, above all, information has migrated to digital media, which implies a greater challenge for organizations…
Read More
According to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is likely to see an increase of state actors taking aim at…
Read More
Dailymotion, the rival to Youtube’s video-sharing empire, has become a victim of a cyber attack called credential stuffing. It is an attack using the usernames and passwords from other data…
Read More
Cybersecurity experts have warned that the massive data breach that might be the biggest ever posted on the internet is just the beginning. The trove of sensitive information that was…
Read More
Many WordPress websites have come under attack via a zero-day flaw in an abandoned plugin. The “Total Donations” plugin, which was earlier used by many WordPress website owners, has now…
Read More
Eight members of the Ohio National Guard have been called in to help an attempted cyber-attack on the city of Akron’s computer servers. Akron asked Gov. Mike DeWine on Friday…
Read More
How can cybercriminals penetrate a network or computer if there are security software in place to prevent it? Some cyber criminals have the answer, attack the very software used for…
Read More