A Timeline of the Ashley Madison Hack

A Timeline of the Ashley Madison Hack

The news about the Ashley Madison hack has broken out at a very fast pace. Keeping up with the current story can be challenging, so here is a one-stop solution…

Read More
KNOB Security Flaw Exploits All Versions Of Bluetooth Devices

“KNOB” Security Flaw Exploits All Versions Of Bluetooth Devices

There are times when technology becomes too ubiquitous and too accessible by the public for its own good, it becomes a favorite target of cybercriminals. Discovery of vulnerability by security…

Read More
Open EDR
Common Social Engineering Attacks and How to Prevent Them

Common Social Engineering Attacks and How to Prevent Them

Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are devising more clever methods of fooling individuals or…

Read More
Canon DSLR Camera The “Unlikely Likely” Candidate For Ransomware Infection

Canon DSLR Camera, The “Unlikely Likely” Candidate For Ransomware Infection

We are covering ransomware and the latest “innovations” to improve it at the expense of the poor victims since 2017. They are always on top of their game in order…

Read More
Cisco To Pay 8.6 Million As Settlement For 5 Year Bug In Their Product

Cisco To Pay $8.6 Million As Settlement For 5-Year Bug In Their Product

The network technology company, Cisco is set to pay a settlement agreement worth $8.6 million for an alleged violation of the U.S. False Claims Act (FCA). The case was brought-up…

Read More
11 Flaws In 2 Billion Devices Using An Unknown OS

11 Flaws In 2-Billion Devices Using An Unknown OS?

It is like being hit by a bullet that we never saw coming our way. That is how we at hackercombat.com describe the controversy with regards to VxWorks embedded OS’…

Read More
Review of Cybersecurity Measures For Customers and Vendors

Review of Cybersecurity Measures For Customers and Vendors

Cybersecurity measures can only be tested in two ways, the first one is something nobody wants to happen: to be tested for real, by a real cyber attack. The second…

Read More
Cybersecurity Protection Needs To Reach The Next Level

Cybersecurity Protection Needs To Reach The Next Level

Here in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with Ponemon…

Read More
36TB Data Breach The Culprit Lenovo’s Obsolete Iomega NAS

36TB Data Breach: The Culprit, Lenovo’s Obsolete Iomega NAS

The probability that Lenovo has earned the infamous record for becoming a subject of the world’s biggest data breach in history is shaping-up fast. The culprit? The still online legacy…

Read More
eCh0raix Ransomware Targeting QNAP Devices

eCh0raix Ransomware Targeting QNAP Devices

The newly discovered ransomware family targets the QNAP network attached storage (NAS) devices. This malicious program, known by security researcher Anomali as eCh0raix (identified by Trend Micro as Ransom.Linux.ECHORAIX.A), was…

Read More

Page 1 of 15

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register