Skip to content
  • Home
  • PRESS
  • CONTACT
    • Public PGP Keys

Ghost Security Group™

Ghost Security Group™ is a counterterrorism organization that combats extremism on the digital front lines using the internet as a weapon.

Tag: Hacking

ISIS Media Website Gets Whacked

Posted on August 3, 2021August 3, 2021 by Ghost Security Group™

Around 3pm GMT today, ISIS media web site, shineofislam.co, was hacked and user logs leaked to a new site, shineofislamleak.com.… Read more ISIS Media Website Gets Whacked

REvil Malware Hackers Gone Missing

Posted on July 14, 2021 by Ghost Security Group™

Sometime early yesterday all websites for Russian-language hackers REvil dropped off the digital map. Unsure if this is global law… Read more REvil Malware Hackers Gone Missing

Krystal Foods: Notice of Potential Payment Card Incident

Posted on October 29, 2019 by Ghost Security Group™

The Krystal Company would like to advise guests that our company is actively investigating a security incident that involves one… Read more Krystal Foods: Notice of Potential Payment Card Incident

YouTube Attacks to Watch Out For in 2019

Posted on June 13, 2019 by Ghost Security Group™

“The two most common types of attacks include hoaxes targeting YouTube channel owners and ones that zero in on ordinary… Read more YouTube Attacks to Watch Out For in 2019

In a first, Israel responds to Hamas hackers with an air strike | ZDNet

Posted on May 6, 2019 by Ghost Security Group™

Israel’s response against Hamas marks the first time that a country has reacted with immediate military force to a cyberattack… Read more In a first, Israel responds to Hamas hackers with an air strike | ZDNet

UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords

Posted on May 4, 2019 by Ghost Security Group™

We at Ghost Security Group™ deal with Islamic State hackers attempting to breach web sites on a daily basis, either… Read more UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords

Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

Posted on April 30, 2019 by Ghost Security Group™

While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to… Read more Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake

Posted on April 15, 2019 by Ghost Security Group™

“Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old,… Read more Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake

Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

Posted on March 28, 2019 by Ghost Security Group™

Nearly half of the industrial control system (ICS) computers protected by Kaspersky Lab were targeted by malware and other threats… Read more Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

Massive cyber attack targeting 99 countries causes sweeping havoc

Posted on May 13, 2017September 5, 2017 by Ghost Security Group™

“Massive cyber attack targeting 99 countries causes sweeping havoc” http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/

  • Facebook
  • X
  • Instagram
  • LinkedIn
  • YouTube
  • Vimeo

© 2015-2026 Ghost Security Group™. All rights reserved.

“Ghost Security Group”, “GhostSecGroup”, “GhostSec” and all other trademarks, service marks, trade names and logos of Ghost Security Group™ appearing on the Ghost Security Group™ site are the property of Ghost Security Group™. All uses of such marks shall inure to the benefit of Ghost Security Group™, and the use of Ghost Security Group’s marks in conjunction with any other logos or marks shall not create a unitary or composite mark. All other trademarks, trade names, service marks, logos, product names, and company names appearing on the Ghost Security Group™ Site are the property of their respective owners.

Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Ghost Security Group™
    • Join 168 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Ghost Security Group™
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar