Hackers claim to have stolen 1.5 terabytes of data from HBO, including information on the current season of Game of Thrones. Are you a fan of ‘Game of Thrones’ series? There is a news for you, hackers claim to have stolen 1.5 terabytes of data from HBO, including information on the current season of Game […]
Late Sunday evening, hackers leaked details alleged stolen from a compromised system maintained by Adi Peretz, a Senior Analyst at Mandiant. Late Sunday evening, hackers have posted details alleged stolen from a system belonging to Adi Peretz, a Senior Threat Intelligence Analyst at security firm FireEye/Mandiant. The leaked archive is a 337MB PST file containing the expertâs emails. […]
At DEF CON hacking conference experts demonstrated how to abuse a machine learning system dubbed OpenAI Gym to create malware that can avoid detection. We have discussed several times about the impact of Artificial Intelligence (AI) on threat landscape, from a defensive perspective new instruments will allow the early detections of malicious patterns associated with threats, […]
Microsoft has announced that the SMBv1 SMBloris bug described at DEF CON won’t be patched because it could be fixed simply blocking incoming connections. Recently security researchers at RiskSense have identified a 20-year-old Windows SMB vulnerability they called SMBloris (a nod to the Slowloris DoS attack.), they presented their findings at the recent DEF CON hacker […]
Hackers attending Def Con hacking conference were invited to hack into voting machines used in US past elections to assess their level of security. DEF CON 2017 –Â Â Are voting systems secure? In August 2016, the FBI issued a âflashâ alert to election officials across the country confirming that foreign hackers have compromised state election systems […]
In compliance with Chinese Internet monitoring law, Apple has started removing all IOS VPN apps from it App Store in China. The company complies with a request from the Chinese Government that wants to strict censorship making it harder for netizens to bypass the Great Firewall system (aka Golden Shield project). The Golden Shield project […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·     Expert exploited an unrestricted File Upload flaw in a PayPal Server to remotely execute code ·     Hacker BestBuy pleads guilty to hijacking more than 900k Deutsche Telekom routers ·     Security Affairs newsletter Round 120 â News […]
The hacker ‘Plore’ demonstrated that it possible to bypass security measures implemented by German manufacturer Armatix for its smart gun. The story I’m going to tell you demonstrates how fragile could be smart objects, some times cheap and off-the-shelf devices could be used to compromise them. This is the case of certain models of smart […]
A security researcher demonstrated how to use a pocket-sized microcomputer BBCâs Micro:bit to take control of a quadcopter drone. In a talk at the at year’s DEF CON hacking conference in Las Vegas, Damien Cauquil, a security researcher at Econocom Digital Security, demonstrated how to use a pocket-sized microcomputer such BBCâs Micro:bit to sniff out keystrokes from a wireless keyboard or […]
Malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones. Another case of pre-installed malware make the headlines, malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones, including Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu […]