Hacking Tools News, Articles and Updates

Kaspersky offers alternate theory for how NSA hacking tools were stolen

Kaspersky Lab has released findings from its own internal probe into how Russian cyber spies identified and stole U.S. hacking tools from an NSA contractor's laptop - found evidence that the laptop had been infected with malware.

ICYMI: Spyware; US data law; NSA tools hack; Games DDoS'd; Skills gap

In Case You Missed It: Spyware in 1,000 apps; US global data grab; NSA tools used to hack hotels; Warcraft DDoS'd; Students narrow skills gap

Ukrainian man helps spread NotPetya to help others avoid paying taxes

Ukrainian police arrested a man earlier this month for helping spread the NotPetya ransomworm through his social media outlets.

Honeypot reveals lack of oversight opened door to WannaCry & NotPetya

If researchers paid more attention to the Shadow Brokers dump of alleged National Security Agency hacking tools back in April, the WannaCry and NotPetya attacks may have never happened.

On the digital frontline: The rise of automated cyber-warfare

Nicola Whiting explains why the defence sector is turning to automated cyber-security to win the fight against cyber-criminals and state-sponsored hackers.

WannaCry not first to exploit NSA EternalBlue, DoublePulsar malware

Turns out that WannaCry's creators were not the first to the table when it comes to exploiting the leaked NSA hacking tools EternalBlue and DoublePulsar.

ICYMI: GDPR spat; NAS vul; Criminal arrests; RingGo App; Hack tools

In Case You Missed It: GDPR 'consent'; NAS vulnerability; 5 criminals arrested; RingGo App vulnerability; More Shadow Brokers tools

ShadowBrokers leak more hacking tools - MS says most exploits patched

Malwarebytes reports recent zero-days among Shadowbrokers hacking tools and code analysis appears to confirm earlier reported NSA origins.

Assange stokes up the surveillance debate but will he like the answer?

With the release of the "Vault 7" CIA files, Julian Assange and WikiLeaks hope to provoke a debate about cyber-espionage tools but what if they don't get the answer they are looking for?

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

Top ten hacker tools identified - misuse of legitimate tools dominates inside the network.