Security News
![Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs (The Hackers News)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell)...
!['OutlawCountry' Tool Used by CIA to Target Linux Systems (Security Week)](/static/build/img/news/alt/antivirus-stats-small.jpg)
One of the tools used by the U.S. Central Intelligence Agency (CIA) to target Linux systems is named OutlawCountry, according to documents published by WikiLeaks. read more
![Wikileaks Reveals CIA Malware that Hacks Linux Computers (The Hackers News)](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to computers running the Linux operating systems. Dubbed...
!['Elsa' Tool Allows CIA to Locate Users via Wi-Fi (Security Week)](/static/build/img/news/alt/antivirus-stats-small.jpg)
WikiLeaks has published a document detailing “Elsa,” a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to track people’s locations via their laptop’s Wi-Fi. read more
![CIA Exploits Against Wireless Routers (Schneier on Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
WikiLeaks has published CherryBlossom, the CIA's program to hack into wireless routers. The program is about a decade old. Four good news articles. Five. And a list of vulnerable routers....
![Here's How CIA Malware Tracks Geo-Location of its Targets (The Hackers News)](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
WikiLeaks has just published a new batch of the ongoing Vault 7 leak, and this time the whistleblowing website has unveiled a classified malware for that tracks geo-location of targeted PCs and...
![Week in review: Evaluating AI-based cyber security systems, how CIA hit air-gapped computers (Help Net Security)](/static/build/img/news/alt/antivirus-stats-small.jpg)
Here’s an overview of some of last week’s most interesting news and articles: How the CIA gained access to air-gapped computers A new WikiLeaks release of documents believed to have been stolen...
![CIA Knew in August that Putin Sought to Boost Trump: Report (Security Week)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
The CIA had top-level intelligence last August that Russian President Vladimir Putin personally ordered an operation to help Donald Trump win the US presidential race, the Washington Post reported...
![How the CIA gained access to air-gapped computers (Help Net Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks....
![WikiLeaks Details CIA's Air-Gapped Network Hacking Tool (Security Week)](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
WikiLeaks published several documents on Thursday detailing a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to hack air-gapped networks through USB drives. read more