• Penetration Testing to check for exploitable vulnerabilities [Infographic]

Penetration Testing to check for exploitable vulnerabilities [Infographic]

Explaining step by step how a penetration test, or pen-test, helps measure the security of an organization’s IT infrastructure by attempting safe exploitation of vulnerabilities. Know how a penetration test…

Read More
WordPress Websites Attacked via Zero Day in Abandoned Plugin

WordPress Websites Attacked via Zero-Day in Abandoned Plugin

Many WordPress websites have come under attack via a zero-day flaw in an abandoned plugin. The “Total Donations” plugin, which was earlier used by many WordPress website owners, has now…

Read More
Open EDR
Extortion Emails with Bomb Threats Cause Panic in US Cities

The Data Breach Hits Marriott Hotels Group Exposes 5 Million Guest Details

Late last year, we have featured here in Hackercombat.com the story about Marriot International Hotel chain data breach and the resulting accusation against China allegedly being the one behind the…

Read More
A Deeper Look At The U.S. Navy’s Resolve Against Cyber Security Threats

A Deeper Look At The U.S. Navy’s Resolve Against Cyber Security Threats

The U.S. Navy is gearing towards increasing their cybersecurity capability in order to foil any cyber attack attempts from outsiders. Dubbed as Resilient Cyber Warfare Capabilities for NAVAIR Weapon Systems…

Read More
Processor Woes Continue 7 New Meltdown and Spectre Bugs Arrive Weeks Before The Holidays

Processor Woes Continue: 7 New Meltdown and Spectre Bugs Arrive Weeks Before The Holidays

2018 is not a good year for chip vendors, as they have not received any break when it comes to the continued stream of discoveries when it comes to their…

Read More
Status of Today’s Email as a Malware Vector

Status of Today’s Email as a Malware Vector

Email has been in use since 1971, as developed by Ray Tomlinson, the person responsible with defining the “@” symbol that separates the domain name from the user’s email name….

Read More
Hack the Marine Corps Nets Over 151000 in Awards

Hack the Marine Corps Nets Over $151,000 in Awards

The results of the ‘Hack the Marine Corps’ bug bounty challenge have been announced; over 150 valid vulnerabilities have been uncovered, netting more than $151,000 in awards. It was in…

Read More
Midland Ontario Canada at the Wake of a Ransomware Attack

Midland, Ontario Canada at the Wake of a Ransomware Attack

Ransomware is a very big business for cybercriminals when partnered with the victim’s inefficient or worse, non-existent backup system – that is a jackpot for ransomware authors. Ransomware attacks user’s…

Read More
EE Hit by Two Security Vulnerabilities

UK Based Firm EE Hit by Two Security Vulnerabilities

As revealed by Tech Crunch, the UK-based telecommunication firm EE, endured recurrent flaws in its online system. In one week, EE fixed two security vulnerabilities that could potentially impact their…

Read More
New Mirai Botnet Variant Now Infects Vulnerable IoT Devices Near You

New Mirai Botnet Variant Now Infects Vulnerable IoT Devices Near You

Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT (Internet-of-Things) devices. The days when toasters, refrigerators, home…

Read More

Page 3 of 6

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register