- Hacking 2020 -

Last update 09.10.2017 13:52:27

Hacking List -  2024  2023  2021  2020  2019  2018


Date

Name

Category

Web

31.12.20

VMware latest to confirm breach in SolarWinds hacking campaignHacking

Bleepingcomputer

31.12.20

Google Docs bug could have allowed hackers to hijack screenshots

Hacking

Securityaffairs

26.12.20

Microsoft Warns CrowdStrike of Hackers Targeting Azure Cloud CustomersHackingThehackernews

18.12.20

Air-Gap Attack Turns Memory Modules into Wi-Fi Radios

Hacking

Threatpost

17.12.20

Microsoft partnered with security firms to sinkhole the C2 used in SolarWinds hack

Hacking

Securityaffairs

17.12.20

RAM-Generated Wi-Fi Signals Allow Data Exfiltration From Air-Gapped Systems

Hacking

Securityweek

16.12.20

Group Behind SolarWinds Hack Bypassed MFA to Access Emails at US Think Tank

Hacking

Securityweek

15.12.20

Exfiltrating Data from Air-Gapped Computers via Wi-Fi Signals (Without Wi-Fi Hardware)

Hacking

Thehackernews
13.12.20Credit card stealer hides in CSS files of hacked online storesHacking

Bleepingcomputer

12.12.20

Ad-injecting malware hijacks Chrome, Edge, Firefox

Hacking

Net-security

11.12.20

New Injection Technique Exposes Data in PDFs

Hacking

Securityweek
11.12.20

Vaccine Documents Hacked as West Grapples With Virus Surge

Hacking

Securityweek
11.12.20

Valve's Steam Server Bugs Could've Let Hackers Hijack Online Games

Hacking

Thehackernews
10.12.20

Crooks hide software skimmer inside CSS files

Hacking

Securityaffairs

29.11.20

Tesla Model X key fobs could be hacked to steal cars, fix released

Hacking

Bleepingcomputer

26.11.20

Laser-Based Hacking from Afar Goes Beyond Amazon Alexa

Hacking

Threatpost

25.11.20

Tesla Hacked and Stolen Again Using Key Fob

Hacking

Threatpost

25.11.20

2FA bypass in cPanel potentially exposes tens of millions of websites to hack

Hacking

Securityaffairs

24.11.20

Researchers show how to steal a Tesla Model X in a few minutes

Hacking

Securityaffairs

23.11.20

Researchers Show Tesla Model X Can Be Stolen in Minutes

Hacking

Securityweek

20.11.20

Hacker Closing Out Prison Sentence in Chicago Halfway HouseHackingSecurityweek

20.11.20

Ubuntu's Gnome desktop could be tricked into giving root accessHacking

Bleepingcomputer

20.11.20

5.8 million RedDoorz user records for sale on hacking forumHacking

Bleepingcomputer

20.11.20

WordPress plugin bugs can let attackers hijack up to 100K sitesHackingBleepingcomputer

20.11.20

Robot Vacuums Suck Up Sensitive Audio in ‘LidarPhone’ Hack

Hacking

Threatpost

19.11.20

Google Chrome 87 Closes High-Severity ‘NAT Slipstreaming’ Hole

Hacking

Threatpost

16.11.20

Hacked Websites, Hate Speech Hit Suburban Chicago SchoolsHackingSecurityweek

16.11.20

ShinyHunters hacked Pluto TV service, 3.2M accounts exposedHackingSecurityaffairs

16.11.20

Researchers break Intel SGX by creating $30 device to control CPU voltage

Hacking

Net-security

13.11.20

Old Worm But New Obfuscation Technique

Hacking

SANS

11.11.20

PLATYPUS: Hackers Can Obtain Crypto Keys by Monitoring CPU Power Consumption

Hacking

Securityweek

6.11.20

In Q2 2020, there was an average of 419 new threats per minute

Hacking

Net-security

5.11.20

Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 CompaniesHackingThehackernews

30.10.20

University Email Hijacking Attacks Push Phishing, Malware

Hacking

Threatpost

28.10.20Compromised CMS Credentials Likely Used to Hack Trump Campaign WebsiteHackingSecurityweek
28.10.20

In Election Hacking, Perception May be as Good as the Real Thing

Hacking

Securityweek
26.10.20

Finland Shocked by Therapy Center Hacking, Client Blackmail

Hacking

Securityweek
26.10.20

Hackers breach psychotherapy center, use stolen health data to blackmail patients

Hacking

Net-security

24.10.20

Hackers hijack Telegram, email accounts in SS7 mobile attackHacking

Bleepingcomputer

21.10.20

Google’s Waze Can Allow Hackers to Identify and Track Users

Hacking

Threatpost

20.10.20

Game Titles Watch Dogs: Legion, Albion Both Targeted by Hackers

Hacking

Threatpost

20.10.20

The forum of the popular Albion Online game was hacked

Hacking

Securityaffairs

19.10.20

Hackers claim to have compromised 50,000 home cameras and posted footage onlineHackingSecurityaffairs
18.10.20Online proctor service ProctorTrack disables service after hackHacking

Bleepingcomputer

16.10.20

Crooks hit Puerto Rico Firefighting Department Servers

Hacking

Securityaffairs
16.10.20

Former Roommate of Accused Capital One Hacker Sentenced

Hacking

Securityweek
16.10.20

Hackers Target Puerto Rico Firefighting Department Servers

Hacking

Securityweek
11.10.20Sam's Club customer accounts hacked in credential stuffing attacksHacking

Bleepingcomputer

11.10.20Comcast cable remotes hacked to snoop on conversationsHacking

Bleepingcomputer

8.10.20

Comcast TV Remote Hack Opens Homes to Snooping

Hacking

Threatpost
8.10.20

Smoke and Mirrors – Hack-for-Hire Group Builds Fake Online Empire

Hacking

Securityweek
8.10.20

Food Delivery Service Chowbus Hacked

Hacking

Securityweek
6.10.20

Fullz House hacked the website of Boom! Mobile provider to steal credit cards

Hacking

Securityaffairs
6.10.20

Video-Game Piracy Group ‘Team Xecuter’ Leaders in Custody

Hacking

Threatpost
6.10.20

Hackers Steal Swiss University Salaries

Hacking

Securityweek

4.10.20

Two charged for hacking NBA, NFL players' social media accountsHacking

Bleepingcomputer

4.10.20

Scanning for SOHO Routers

Hacking

SANS

2.10.20Hacked Hospital Chain Says All 250 US Facilities AffectedHackingSecurityweek
2.10.20

NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk

Hacking

Threatpost
28.9.20Red Team — Automation or Simulation?HackingThehackernews
27.9.20Microsoft disrupts nation-state hacker op using Azure Cloud serviceHacking

Bleepingcomputer

27.9.20Scammers drain bank accounts using AnyDesk and SIM-swappingHacking

Bleepingcomputer

27.9.20Hackers sell access to your network via remote management appsHackingBleepingcomputer
26.9.20

Fortinet VPN with default certificate exposes 200,000 businesses to hack

Hacking

Securityaffairs
25.9.20

Fortinet VPN with Default Settings Leave 200,000 Businesses Open to Hackers

Hacking  Incindent

Thehackernews
25.9.20

What are the most hack-resistant industries?

Hacking

Net-security

24.9.20

Gamer Credentials Now a Booming, Juicy Target for Hackers

Hacking

Threatpost
23.9.20Airbnb Accounts Exposed to Hijacking Due to Phone Number RecyclingHackingSecurityweek
22.9.20Hackers hit Luxottica, production stopped at two Italian plantsHackingSecurityaffairs
22.9.20British Hacker Sentenced to 5 Years for Blackmailing U.S. CompaniesHackingThehackernews
22.9.20

Alleged Activision hack, 500,000 Call Of Duty players impacted

Hacking

Securityaffairs
21.9.20

Mozilla Discontinues Firefox Feature Abused in Malware, Phishing Attacks

Hacking

Securityweek
20.9.20Magento stores hit by largest automated hacking attack since 2015Hacking

Bleepingcomputer

20.9.20A Bug Could Let Attackers Hijack Firefox for Android via Wi-Fi NetworkHackingThehackernews
13.9.20Hackers use legit tool to take over Docker, Kubernetes platformsHacking

Bleepingcomputer

10.9.20

TeamTNT Gains Full Remote Takeover of Cloud Instances

Hacking

Threatpost
6.9.20Hackers use overlay screens on legitimate sites to steal Outlook credentialsHackingSecurityaffairs
3.9.20Cisco Jabber Bug Could Let Hackers Target Windows Systems RemotelyHackingThehackernews
3.9.20

New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data

Hacking  Social

Thehackernews
1.9.20

Stolen Fortnite Accounts Earn Hackers Millions Per Year

Hacking

Threatpost
1.9.20

Safe domain: How to protect your enterprise from DNS hijacking

Hacking

Net-security

29.8.20

Former Cisco employee pleads guilty to hacking, damaging company systems

Hacking

Securityaffairs

28.8.20

Cisco addresses ten high-risk issues in NX-OS softwareHackingSecurityaffairs

28.8.20

Former Employee Admits Hacking, Damaging Cisco SystemsHackingSecurityweek

28.8.20

Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads

Hacking

Threatpost

28.8.20

Group with numerous faces: chronicle of UltraRank’s deceptive JS-sniffer campaigns

Hacking

Securityaffairs

28.8.20

Experts hacked 28,000 unsecured printers to raise awareness of printer security issues

Hacking

Securityaffairs

28.8.20

Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked

Hacking

Securityweek

27.8.20

Google Location-Tracking Tactics Troubled Its Own EngineersHackingSecurityweek
22.8.20Thousands of WordPress WooCommerce stores potentially exposed to hackHackingSecurityaffairs
21.8.20

Hackers Target Defense Contractors' Employees By Posing as Recruiters

Hacking

Thehackernews
18.8.20

Jack Daniels, Ritz London Face Cyberattacks

Hacking

Threatpost
17.8.20Reddit hit by coordinated hack promoting Trump's reelectionHacking

Bleepingcomputer

17.8.20Hackers abuse lookalike domains and favicons for credit card theftHacking

Bleepingcomputer

14.8.20

Threat actor leaked data for U.S. gun exchange site on hacking forum

Hacking

Securityaffairs
13.8.20

Threat actors managed to control 23% of Tor Exit nodes

Hacking

Securityaffairs
12.8.20Microsoft Reveals New Innocent Ways Windows Users Can Get HackedHackingThehackernews
12.8.20HDL Smart Devices in Homes and Buildings Exposed to Hacker AttacksHackingSecurityweek
12.8.20Google Chrome Bug Could Let Hackers Bypass CSP Protection; Update Web BrowsersHackingThehackernews
10.8.20Accounts of Reddit Moderators Hijacked in Pro-Trump HackHackingSecurityweek
10.8.20Bypassing Windows 10 UAC with mock folders and DLL hijackingHacking  OS

Bleepingcomputer

8.8.20Remotely hack a Mercedes-Benz E-Class is possible, experts demonstratedHackingSecurityaffairs
7.8.20Attackers Horn in on MFA Bypass Options for Account TakeoversHacking

Threatpost

7.8.20Reddit massive hack: hackers defaced channels with pro-Trump messagesHackingSecurityaffairs

7.8.20

Chinese Researchers Show How They Remotely Hacked a Mercedes-BenzHacking

Securityweek

29.7.20

Vatican Allegedly Hacked by China Ahead of Key TalksHackingSecurityweek

22.7.20

DeepSource Says Hackers Compromised Its GitHub Application

Hacking

Securityweek

17.7.20

Threat Actors Introduce Unique ‘Newbie’ Hacker Forum

Hacking

Threatpost

17.7.20

Group-IB helps to detain fraudsters that used cloned SIM cards to steal money from banks’ VIP customers

Hacking

Securityaffairs

16.7.20

Several High-Profile Twitter accounts hacked in a Bitcoin scamHackingSecurityaffairs

14.7.20

Researchers extract personal data from video conference screenshots

Hacking

Net-security

12.7.20

Google will ban ads for stalkerware starting August 11Hacking

Bleepingcomputer

12.7.20

Evilnum hackers use the same malware supplier as FIN6, CobaltHacking

Bleepingcomputer

12.7.20

Over 15 billion credentials in circulation on hacker forumsHacking

Bleepingcomputer

11.7.20

Evilnum Group targets European and British fintech companiesHackingSecurityaffairs

11.7.20

Smartwatch Hack Could Trick Dementia Patients into OverdosingHackingThreatpost

10.7.20

Evilnum Group Targets Fintech Companies in Europe

Hacking

Securityweek

9.7.20

Notorious Hacker ‘Fxmsp’ Outed After Widespread Access-DealingHackingThreatpost
9.7.2015 Billion Credentials Currently Up for Grabs on Hacker ForumsHackingThreatpost

8.7.20

Redirect auctionHackingSecurelist
8.7.20Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce SitesHackingThreatpost
4.7.20Hackers are targeting unsecured MongoDB databaseHacking

Securityaffairs

6.20WikiLeaks Founder Charged With Conspiring With LulzSec & Anonymous HackersHackingThehackernews
6.20Hackers Using Google Analytics to Bypass Web Security and Steal Credit CardsHackingThehackernews
6.20Indian IT Company Was Hired to Hack Politicians, Investors, Journalists WorldwideHackingThehackernews
6.20Any Indian DigiLocker Account Could've Been Accessed Without PasswordHackingThehackernews
6.20Critical 'Sign in with Apple' Bug Could Have Let Attackers Hijack Anyone's AccountHackingThehackernews
6.20Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in SecondsHackingThehackernews
30.5.20‘Hack-For-Hire’ Firms Spoof WHO To Target Google CredentialsHackingThreatpost
30.5.20Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in SecondsHackingThehackernews
29.5.20Researchers Unmask Brazilian Hacker Who Attacked Thousands of WebsitesHacking

Securityweek

28.5.20Researchers Uncover Brazilian Hacktivist's Identity Who Defaced Over 4800 SitesHackingThehackernews
22.5.20

Tools Used in GhostDNS Router Hijack Campaigns Dissected

Hacking

Securityweek
19.5.20

Hackers Target Oil Producers During COVID-19 Slump

Hacking

Securityaffairs
17.5.20

Experts reported the hack of several supercomputers across Europe

Hacking

Securityaffairs
16.5.20Researcher finds 1,236 websites infected with credit card stealersHacking

Bleepingcomputer

15.5.20WordPress plugin bugs can let hackers take over almost 1M sitesHacking

Bleepingcomputer

15.5.20UK Electricity Market Administrator Elexon Targeted by HackersHackingSecurityweek
11.5.20Shiny Hunters group is selling data from 11 companies on the Dark WebHacking

Securityaffairs

10.5.20Microsoft's GitHub account hacked, private repositories stolenHacking

Bleepingcomputer

9.5.20

InfinityBlack hacker group dismantled by European authoritiesHacking

Bleepingcomputer

9.5.20

Game patch gives hackers access to development content on Amazon S3Hacking

Bleepingcomputer

9.5.20

Hacker sells 91 million Tokopedia accounts, cracked passwords sharedHacking

Bleepingcomputer

9.5.20Report: Microsoft’s GitHub Account Gets HackedHacking

Threatpost

9.5.20Microsoft investigates claims that its GitHub account has been hackedHacking

Securityaffairs

8.5.20

Microsoft Investigating GitHub Account Hacking Claims

Hacking

Securityweek

8.5.20

Search Company Algolia Hacked via Recent Salt Vulnerabilities

Hacking

Securityweek

6.5.20

Law enforcement agencies dismantled Infinity Black hacker groupHackingSecurityaffairs
5.5.20

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Hacking

Threatpost

29.4.20Convict in LA Times Hack Again Accused of Attacking MediaHackingSecurityweek
29.4.20New Version of Infection Monkey Maps to MITRE ATT&CK FrameworkHackingSecurityweek
28.4.20100k+ WordPress sites exposed to hack due to a bug in Real-Time Find and Replace pluginHackingSecurityaffairs
27.4.20Hacking Microsoft Teams accounts with a GIF imageHackingSecurityaffairs
27.4.20How An Image Could've Let Attackers Hack Microsoft Teams AccountsHackingThehackernews
27.4.20Hackers exploit SQL injection zero-day issue in Sophos firewallHackingSecurityaffairs
26.4.20New GreyNoise free service alerts you when your devices get hackedHacking

Bleepingcomputer

23.4.20Uptick in RPA Software Adoption Reveals Need for Anti-Hacking TrainingHackingSecurityaffairs
23.4.20Nation-backed Hackers Tune Attacks to COVID-19 Fears: GoogleHackingSecurityweek
22.4.20

What does it take to become a good reverse engineer?

Hacking

Securelist
16.4.20Linksys force password reset to prevent Router hijackingHackingSecurityaffairs
16.4.20Linksys Prompts Password Reset to Prevent Router HackingHackingSecurityweek

13.4.20

SEC Settles With Two Traders Charged in EDGAR Hacking CaseHackingSecurityweek
12.4.20Hackers struggle morally and economically over CoronavirusHacking

Bleepingcomputer

11.4.20

NASA under 'significantly increasing' hacking, phishing attacksHacking  PhishingBleepingcomputer

11.4.20

Microsoft buys corp.com to prevent Windows account hijackingHacking

Bleepingcomputer

7.4.20Updated: Italian email provider Email.it hacked, data of 600k users available for saleHackingSecurityaffairs
7.4.20

Italian email provider Email.it hacked, data of 600k users available for sale

Hacking

Securityaffairs
6.4.20Popular OGUsers hacking forum breached for the second time in a yearHackingSecurityaffairs
5.4.20Zoom's Web Client is Down, Users Report 403 Forbidden ErrorsHacking

Bleepingcomputer

4.4.20Hacker 'Ceasefire' Gets Little Traction as Pandemic Fuels AttacksHackingSecurityweek

3.4.20

100,000 WordPress sites using the Contact Form 7 Datepicker plugin are exposed to hackHackingSecurityaffairs
2.4.20Magecart Hackers Inject iFrame Skimmers in 19 Sites to Steal Payment DataHackingThehackernews
2.4.20Zoom client for Windows could allow hackers to steal users’Windows passwordHackingSecurityaffairs
2.4.20

Large number of mobile apps may be vulnerable to hacking

Hacking  Mobil  Vulnerebility

Net-security

30.3.20

Utah Investigating Hacking of Candidate's Virtual EventHackingSecurityweek

29.3.20

AMD admits hacker stole source code files related to its GPUsHackingSecurityaffairs

29.3.20

Tupperware Site Hacked With Fake Form to Steal Credit CardsHacking

Bleepingcomputer

27.3.20

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

Hacking

Threatpost

27.3.20AMD Confirms Hacker Stole Information on Graphics ProductsHackingSecurityweek

22.3.20

Healthcare sector targeted : what you need to know about the hackers very unusual strategy

Hacking

Securityaffairs

21.3.20

Hackers Target UK Fintech Company Finastra

Hacking

Securityweek

20.3.20

California Man Gets Prison for Hacking Atlanta-Based CompanyHackingSecurityweek

17.3.20

Researchers Uncover a Nigerian Hacker's Pursuit of his Million Dollar Dream

Hacking

Thehackernews
12.3.20Hacking a network, using an ‘invisibility cloak’ – Is it that simple?HackingSecurityaffairs
10.3.20Hackers use hackers spreading tainted hacking tools in long-running campaignHackingSecurityaffairs
10.3.20Hackers Hack Hacking Tools to Hack HackersHackingSecurityweek
5.3.20Hundreds of Microsoft sub-domains open to hijackingHackingSecurityaffairs
5.3.20Over 600 Microsoft Subdomains Can Be Hijacked: ResearchersHackingSecurityweek
5.3.20Hamas-Linked Hackers Add Insurance and Retail to Target ListBigBrothers  HackingSecurityweek
3.3.20Forrester: Keeping Smart Cities Safe From HacksHacking

Threatpost

2.3.20Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant DevicesHackingThehackernews

1.3.20

SQL Dump from BGR India Shared on Hacker ForumHacking

Bleepingcomputer

29.2.20

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

Hacking

Threatpost

29.2.20

ProtonMail Fights Email Spoofing With New DKIM Key Management FeatureHacking  SafetySecurityweek

28.2.20

Hacking has become a viable career, according to HackerOne

Hacking

Net-security

27.2.20

Hackers Cashing In On Healthcare Industry Security Weaknesses

Hacking

Threatpost

25.2.20

Hacking campaign targets sites running popular Duplicator WordPress pluginHackingSecurityaffairs
22.2.20Ring Forces 2FA On All Users to Secure Cameras from HackersHacking

Bleepingcomputer

22.2.20Microsoft Surface Laptop 3 Screens Are Spontaneously CrackingHacking

Bleepingcomputer

19.2.20Ring Makes 2-Factor Authentication Mandatory Following Recent HacksHackingThehackernews
19.2.20Hacker Scheme Threatens AdSense Customers with Account SuspensionHacking

Threatpost

18.2.20

Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack

Hacking  Vulnerebility

Securityaffairs
18.2.20

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Hacking  IoT

Securityaffairs
18.2.20FC Barcelona and the International Olympic Committee Twitter accounts hackedHackingSecurityaffairs
17.2.20Organizers of major hacking conferences in Asia put them on hold due to Coronavirus outbreakHackingSecurityaffairs

15.2.20

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

Hacking

Threatpost

14.2.20Three Italian universities hacked by LulzSec_ITA collectiveHackingSecurityaffairs
11.2.20The Altsbit exchange will exit in May following a hackHackingSecurityaffairs
9.2.20Realtek Fixes DLL Hijacking Flaw in HD Audio Driver for WindowsHacking  Vulnerebility

Bleepingcomputer

8.2.20Pirated Software is All Fun and Games Until Your Data’s StolenHacking

Bleepingcomputer

7.2.20Brazil Judge Rejects Hacking Accusation Against GreenwaldHackingSecurityweek

6.2.20

DLL Hijacking Vulnerability Found in Realtek HD Audio DriverHacking  VulnerebilitySecurityweek
3.2.20Police are warning crooks are using cleaners to compromise businessesHackingSecurityaffairs

1.2.20

OurMine Hackers Are Back, Hijack NFL Teams' Social AccountsHacking  Social

Bleepingcomputer

1.2.20

Hackers penetrated NEC defense business division in 2016HackingSecurityaffairs

30.1.20

Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud ServersHacking  VulnerebilityThehackernews

29.1.20

Leaked Report Shows United Nations Suffered Hack

Hacking

Securityweek
29.1.20Trolls-For-Hire Pave Way For Sophisticated Social Media HacksHackingThreatpost

28.1.20

Rui Pinto: Hacker Who Targeted Football and Angola's 'Princess'HackingSecurityweek
28.1.20Attacks on ADC Ramp Up as Citrix Releases Remaining PatchesAttack  HackingSecurityweek
26.1.20Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hackExploit  Hacking  VulnerebilitySecurityaffairs
22.1.20Brazilian Prosecutors Accuse Glenn Greenwald in Hacking CaseHackingSecurityweek

19.1.20

Hackers Are Securing Citrix Servers, Backdoor Them for AccessHacking  Vulnerebility

Bleepingcomputer

19.1.20

WordPress Plugin Bugs Let Hackers Wipe or Takeover Your SiteHacking

Bleepingcomputer

18.1.20

Turkish Hackers hit Greek Government websites and local stock exchangeBigBrothers  HackingSecurityaffairs

13.1.20

Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking

Hacking

Net-security

10.1.20

Connected Cars Moving Targets for HackersHackingSecurityweek

10.1.20

More Threat Groups Target Electric Utilities in North AmericaHackingSecurityweek
9.1.20Travelex Says Financially Unaffected by HackingHackingSecurityweek
8.1.20Researchers Demonstrate How to Hack Any TikTok Account by Sending SMSHacking  MobilThehackernews
7.1.20

Magecart Hits Parents and Students via Blue Bear Attack

Hacking

Threatpost

3.1.20Xiaomi Cameras Connected to Google Nest Expose Video Feeds From OthersHackingThehackernews