Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Stephen Hawking
Posts Tagged ‘Ghost Security Group’
Most Recent
Read More
January 26, 2016

What to Expect from Cybersecurity in 2016, According to the Hacktivists Fighting ISIS

According to Ghost Security Group, 2016 will be an eventful year in cybersecurity. Ransomware, ISIS, Bitcoin, hacks and breaches will likely paint the headlines as they did in 2015. 

“As was seen recently with the Ransom32 software earlier this year, ransomware is only getting better,” Ghost Security Group activist Akenalus told Hacked. “At some point it may even begin scanning our computers, extracting credit card information and automatically paying its own ransom.” This isn’t likely to happen any time soon, but it will be coming in the next few years.

“We can most definitely expect ransomware to be more commonly used, maybe even being used to take over things [...]

Read More
November 17, 2015

Unlikely Allies: Anonymous Hactivists & The US Government Join Forces Against ISIS

E.T. Brooking’s wrote for Foreign Policy what Ghost Security Group executive director, DigitalShadow, calls “a very accurate reflection of our operations against extremism.”

In that article, the author details the Alice In Wonderland world in which hacktivists team up with national law enforcement agencies against the Islamic State.

It’s counter-intuitive, but it is so. Sometimes, truth is stranger than fiction. One such hacktivist compiled a database of 26,000 Islamic State-affiliated Twitter accounts and even built a website to host the list so anybody could see it. The hacktivist, who goes by the pseudonym “XRSone,” essentially became the de-facto spokesman for [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University