Skip to content
  • Home
  • PRESS
  • CONTACT
    • Public PGP Keys

Ghost Security Group™

Ghost Security Group™ is a counterterrorism organization that combats extremism on the digital front lines using the internet as a weapon.

Category: Hacking

Hacker who helped Islamic State to remain in US prison

Posted on October 7, 2020 by Ghost Security Group™

ALEXANDRIA, Va. (AP) — A computer hacker who gave the Islamic State group personal data of more than 1,300 U.S.… Read more Hacker who helped Islamic State to remain in US prison

“United Cyber Caliphate” Woman Sentenced in Georgia

Posted on December 5, 2019March 20, 2020 by Ghost Security Group™

Original source AUGUSTA, Ga. (WRDW/WAGT) — A Hephzibah woman accused of helping ISIS is expected to be sentenced in court… Read more “United Cyber Caliphate” Woman Sentenced in Georgia

Krystal Foods: Notice of Potential Payment Card Incident

Posted on October 29, 2019 by Ghost Security Group™

The Krystal Company would like to advise guests that our company is actively investigating a security incident that involves one… Read more Krystal Foods: Notice of Potential Payment Card Incident

UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords

Posted on May 4, 2019 by Ghost Security Group™

We at Ghost Security Group™ deal with Islamic State hackers attempting to breach web sites on a daily basis, either… Read more UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords

Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake

Posted on April 15, 2019 by Ghost Security Group™

“Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old,… Read more Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake

Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

Posted on March 28, 2019 by Ghost Security Group™

Nearly half of the industrial control system (ICS) computers protected by Kaspersky Lab were targeted by malware and other threats… Read more Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

U.S. DoD Releases Official 2018 Cyber Strategy

Posted on September 30, 2018September 30, 2018 by Ghost Security Group™

The Department’s cyberspace objectives are: 1. Ensuring the Joint Force can achieve its missions in a contested cyberspace environment; 2.… Read more U.S. DoD Releases Official 2018 Cyber Strategy

New airborne Bluetooth cyber threat, “BlueBorne,” that exposes almost every device to remote attack.

Posted on September 12, 2017September 13, 2017 by Ghost Security Group™

“Eight Bluetooth-related vulnerabilities (four that are critical) affecting over 5 billion Android, Windows and Linux devices could allow attackers to… Read more New airborne Bluetooth cyber threat, “BlueBorne,” that exposes almost every device to remote attack.

Massive cyber attack targeting 99 countries causes sweeping havoc

Posted on May 13, 2017September 5, 2017 by Ghost Security Group™

“Massive cyber attack targeting 99 countries causes sweeping havoc” http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/

NIA probes Islamic State ‘kill-list’ of I-T engineers who tracked group online, 70 from Mumbai

Posted on February 9, 2017September 5, 2017 by Ghost Security Group™

The National Investigation Agency (NIA) has obtained what it calls a “kill list” prepared by handlers of the Islamic State… Read more NIA probes Islamic State ‘kill-list’ of I-T engineers who tracked group online, 70 from Mumbai

  • Facebook
  • X
  • Instagram
  • LinkedIn
  • YouTube
  • Vimeo

© 2015-2026 Ghost Security Group™. All rights reserved.

“Ghost Security Group”, “GhostSecGroup”, “GhostSec” and all other trademarks, service marks, trade names and logos of Ghost Security Group™ appearing on the Ghost Security Group™ site are the property of Ghost Security Group™. All uses of such marks shall inure to the benefit of Ghost Security Group™, and the use of Ghost Security Group’s marks in conjunction with any other logos or marks shall not create a unitary or composite mark. All other trademarks, trade names, service marks, logos, product names, and company names appearing on the Ghost Security Group™ Site are the property of their respective owners.

Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Ghost Security Group™
    • Join 168 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Ghost Security Group™
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar