Security News
WikiLeaks published several documents on Thursday detailing a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to hack air-gapped networks through USB drives. read more
Sprawling “Brutal Kangaroo“ spreads malware using booby-trapped USB drives.
WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a tool suite – which is being used by the CIA for Microsoft Windows that targets "closed networks by air gap...
WikiLeaks Dump Describes Custom Linux Firmware to Pwn Widely Used RoutersA new dump from WikiLeaks has revealed an apparent CIA project - code named "CherryBlossom" - that since 2007 has used...
Here’s an overview of some of last week’s most interesting news and articles: End-to-end email encryption with no central point of attack A seamless, easy-to-use, and secure end-to-end encrypted...
The latest dump from Wikileaks alleges the CIA installed custom router firmware on unsuspecting targets in order to spy on internet activity.
For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through them, documents leaked...
Documents published by WikiLeaks on Thursday provide details on a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to hack routers and access points. read more
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.