Category: Leaked Data

Backdoors in network security products

The diffusion of technology in our society has an important consequence. We’ve adopted the technology elements so rapidly in our daily lives – without even understanding the implications of how our own daily life routine can be used against us. In the today’s business environment, enterprises are also turning into …

WannaCry attacking group “Shadow Brokers” are back with a new Zero-Day Exploits Subscription Service

The mysterious group “Shadow brokers”- the one who caused WannaCry menace few weeks ago – are back with a replacement plan of beginning a monthly dump service. The hacking collective group is claiming that they had antecedently purloined way more complicated NSA hacking tools and exploits and now they will unleash …