Security News

CIA Tools for Stealing SSH Credentials Exposed by WikiLeaks (Security Week)
2017-07-07 09:17

WikiLeaks has published documents detailing BothanSpy and Gyrfalcon, tools allegedly used by the U.S. Central Intelligence Agency (CIA) to steal SSH credentials from Windows and Linux systems. read more

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs (The Hackers News)
2017-07-06 11:41

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell)...

'OutlawCountry' Tool Used by CIA to Target Linux Systems (Security Week)
2017-07-03 12:12

One of the tools used by the U.S. Central Intelligence Agency (CIA) to target Linux systems is named OutlawCountry, according to documents published by WikiLeaks. read more

Wikileaks Reveals CIA Malware that Hacks Linux Computers (The Hackers News)
2017-06-30 13:03

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, this time detailing an alleged CIA project that allowed the agency to computers running the Linux operating systems. Dubbed...

'Elsa' Tool Allows CIA to Locate Users via Wi-Fi (Security Week)
2017-06-28 17:32

WikiLeaks has published a document detailing “Elsa,” a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to track people’s locations via their laptop’s Wi-Fi. read more

CIA Exploits Against Wireless Routers (Schneier on Security)
2017-06-28 10:35

WikiLeaks has published CherryBlossom, the CIA's program to hack into wireless routers. The program is about a decade old. Four good news articles. Five. And a list of vulnerable routers....

Here's How CIA Malware Tracks Geo-Location of its Targets (The Hackers News)
2017-06-28 06:03

WikiLeaks has just published a new batch of the ongoing Vault 7 leak, and this time the whistleblowing website has unveiled a classified malware for that tracks geo-location of targeted PCs and...

Week in review: Evaluating AI-based cyber security systems, how CIA hit air-gapped computers (Help Net Security)
2017-06-26 02:00

Here’s an overview of some of last week’s most interesting news and articles: How the CIA gained access to air-gapped computers A new WikiLeaks release of documents believed to have been stolen...

CIA Knew in August that Putin Sought to Boost Trump: Report (Security Week)
2017-06-24 01:50

The CIA had top-level intelligence last August that Russian President Vladimir Putin personally ordered an operation to help Donald Trump win the US presidential race, the Washington Post reported...

How the CIA gained access to air-gapped computers (Help Net Security)
2017-06-23 18:55

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks....