Indigo Defense

Cyber security news and services in London and New York

Primary Menu

Skip to content
Indigo Defense
  • Hire us

legal

The FBI Used Classified Hacking Tools in Ordinary Criminal Investigations

The FBI’s Remote Operations Unit has hacking tools typically reserved for protecting national security. But an overlooked section of a new report says ROU has used these secret techniques in criminal cases. Source: vice… Read More


Data breach victims can sue Yahoo in the United States: judge

Yahoo has been ordered by a federal judge to face much of a lawsuit in the United States claiming that the personal information of all 3 billion users was compromised in a series of data breaches. Source: reuters… Read More


Hire us

Interested in SRE, AI?

Visit our page AAA Minds

Search

Archives

  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • May 2017

Latest news

  • Nasty PHP7 remote code execution bug exploited in the wild
  • Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer
  • The year-long rash of supply chain attacks against open source is getting worse
  • We Cannot Afford to Lose the Digital Revolution.
  • Hamstrung by ransomware, 10 hospitals are turning away some patients

Categories

  • 0day (11)
  • 2fa (2)
  • adware (1)
  • africa (2)
  • ai (13)
  • alexa (4)
  • alpine (2)
  • amazon (5)
  • amd (3)
  • analysis (5)
  • android (12)
  • antivirus (1)
  • apt (4)
  • apt32 (1)
  • arrest (1)
  • art (1)
  • atm (2)
  • authentication (1)
  • aws (6)
  • backdoor (6)
  • bank (6)
  • bgp (5)
  • bigdata (1)
  • bikeshare (1)
  • bitcoin (31)
  • blockchain (36)
  • botnet (10)
  • breach (32)
  • bug (20)
  • business (8)
  • car (4)
  • carbanak (1)
  • card (1)
  • censorship (1)
  • certificate (1)
  • china (17)
  • chrome (4)
  • cia (2)
  • cisco (4)
  • clone (1)
  • coinbase (1)
  • coinhive (1)
  • container (1)
  • counterfeit (2)
  • credit (2)
  • creditcard (1)
  • crime (19)
  • cryptocurrency (99)
  • cryptography (6)
  • cryptomining (29)
  • cuba (2)
  • darkweb (3)
  • darpa (1)
  • ddos (9)
  • dns (5)
  • docker (2)
  • drone (3)
  • drupal (5)
  • electron (1)
  • encryption (9)
  • energy (1)
  • eos (2)
  • equifax (5)
  • espionage (5)
  • eternalblue (1)
  • ethereum (30)
  • excel (1)
  • exim (2)
  • exploit (15)
  • facerecognition (7)
  • fake (2)
  • fakeidentity (1)
  • fbi (7)
  • fin7 (1)
  • finfisher (2)
  • forensics (2)
  • forgery (1)
  • fraud (1)
  • fuzzing (5)
  • gdpr (3)
  • geolocation (2)
  • geopolitics (22)
  • git (1)
  • github (1)
  • google (9)
  • hacked (32)
  • hacking (55)
  • health (2)
  • healthcare (6)
  • honeypot (1)
  • ico (17)
  • identity (2)
  • ie (2)
  • ig (1)
  • informant (1)
  • insidertrading (1)
  • insurance (1)
  • internet (1)
  • iot (6)
  • iota (1)
  • iphone (9)
  • israel (1)
  • javascript (1)
  • kubernetes (4)
  • leak (16)
  • legal (2)
  • lte (2)
  • machinelearning (2)
  • malspam (1)
  • malware (55)
  • meltdown (4)
  • microsoft (2)
  • mining (1)
  • mobile (11)
  • monero (9)
  • nationalsecurity (1)
  • nodejs (1)
  • nsa (11)
  • nuclearplants (1)
  • osx (3)
  • patent (1)
  • patenttrolls (1)
  • pentest (4)
  • pgp (2)
  • phishing (5)
  • phone (1)
  • php (2)
  • piracy (4)
  • police (3)
  • porn (1)
  • pos (3)
  • postmortem (1)
  • predictive (1)
  • privacy (64)
  • ransomware (19)
  • rca (1)
  • rce (10)
  • regulation (5)
  • research (8)
  • reverseengineer (1)
  • reverseengineering (23)
  • rootkit (1)
  • rowhammer (3)
  • rtorrent (1)
  • ruby (2)
  • russia (4)
  • s3 (2)
  • satellite (1)
  • scam (12)
  • sec (4)
  • security (5)
  • sex (2)
  • shadowbroker (3)
  • signal (1)
  • skimmer (1)
  • skimming (1)
  • smartcontract (7)
  • smartgrid (1)
  • socialengineering (3)
  • socialhacking (10)
  • sonicweapon (1)
  • spam (1)
  • spectre (10)
  • spying (5)
  • spyware (5)
  • sso (1)
  • stablecoin (1)
  • stateactor (14)
  • study (10)
  • surveillance (11)
  • swatting (1)
  • tax (3)
  • Team ID (1)
  • technology (7)
  • telegram (4)
  • tor (3)
  • trojan (3)
  • troll (1)
  • tsa (1)
  • twitter (1)
  • typosquatting (1)
  • uber (3)
  • ufo (2)
  • uk (2)
  • usererror (9)
  • vault7 (1)
  • voting (1)
  • vulnerability (91)
  • wannacry (1)
  • warfare (20)
  • web (4)
  • webauthn (1)
  • wifi (2)
  • windows (3)
  • wiper (1)
  • wordpress (1)

You have a cyber security issue? Hire us.

Footer Menu

  • Top
  • Home
© 2019 Indigo Defense. Theme by XtremelySocial.