Cyberattack Stories

43 Stories

World War Hacker  by Techn0master
#1
World War Hacker by
Set in an alternate Early 21st Century, somewhere around the late 90s and early 2000s, Machines are created to help humans and to provide care and aid. But then, on Marc...
CYBER by Etamateni
#2
CYBERby Etamateni Æ Monetes
William Haka, usually considered as the most wisest child ever born. Due to his extremely talented gifts, many sought to own that gift. Even though he is just a boy, he...
Harassment and Open Vandalism by ThE_Road_LesS_takeN-
#4
Harassment and Open Vandalismby がんばれ
Here are the proof that some druggy lunatics who desperately seek attention and want it at any cost are manipulating my friends and Readers alike. They know no bounds. T...
How to Prevent Your Data Loss? by cyberradarsystem
#5
How to Prevent Your Data Loss?by cyberradar system
Data breaches can cause serious damages to an organization. The biggest loss could be the loss of name, fame, image, and identity which further can reduce sales resultin...
Echoes of Dissonance: A Requiem for Tomorrow by LewisNasvlach
#6
Echoes of Dissonance: A Requiem fo...by lewis
What if : In "Echoes of Dissonance: A Requiem for Tomorrow," a group led by Ted Kaczynski challenges the growing reliance on technology. Starting in a remote c...
Ransomware on the Rise: How a SOC Shields Your Business by microscancommun
#7
Ransomware on the Rise: How a SOC...by Microscan Communications
Managed SOC services that deliver 24/7 monitoring, rapid response, and proactive defense against evolving cyber threats.
How Supply Chain Attacks Could Be Compromising Your Business by Bornsec
#8
How Supply Chain Attacks Could Be...by Bornsec
What is a Supply Chain Attack? A supply chain attack is a sophisticated cyber threat that targets the weakest points within a network of suppliers and partners to gain u...
Cyber Goes On The Defensive | Black Hat Conference 2018 by robertbrooks07
#10
Cyber Goes On The Defensive | Blac...by Robert Brooks
Black Hat Founder Jeff Moss kicked off the 2018 Black Hat conference and pointing out that modern day cyber security technology tends to favor the offense, the time has...
BEHIND THE FILES: "1" by TheSecretCompanyOrg
#11
BEHIND THE FILES: "1"by TheSecretCompanyOrg
"Behind the Files" follows cybersecurity expert Alex Mercer and Detective Sarah Collins as they uncover disturbing files on a company's server linked to a seri...