Hacking News

Latest hacking information from the underworld

Common Infiltration, Exfiltration Methods.

Many organizations are still having difficulties protecting their systems against the most common infiltration, exfiltration and lateral movement methods used by attackers, according to the latest Hacker’s Playbook report from SafeBreach. The company provides a platform designed to test an organization’s defenses by continuously simulating attacks and breaches. Read more

Common Infiltration, Exfiltration Methods. Read More »

Developers Targeted in ‘ParseDroid’ PoC Attack

Researchers have developed a proof of concept attack that could impact the millions of users of integrated development environments such as Intellij, Eclipse and Android Studio. Attacks can also be carried out against servers hosting development environments in the cloud. The attack vector was identified by the Check Point Research Team, which on Tuesday released

Developers Targeted in ‘ParseDroid’ PoC Attack Read More »