Breaking News

Pierluigi Paganini June 02, 2017
Crowdfunding initiative aims to buy Shadow Brokers leak before threat actors

Crowdfunding initiative aims to buy Shadow Brokers leak before threat actors will start using the hacking tools and exploits in the wild. The Shadow Brokers hacker group is going to launch a monthly subscription model for its data dumps, 0-Day Exploit Subscriptions goes for (100 Zcash), approximately $24,450 per month. The hacking tools and exploits that will […]

Pierluigi Paganini June 02, 2017
President Putin blames Patriotic Russian hackers for recent Election attacks

Russian President Putin says patriotic hackers may have powered attacks against foreign countries and denied Russia involvement. President Vladimir Putin says patriotic hackers may have launched cyber attacks against foreign countries and but denied Russia involvement in cyber espionage campaigns. Russian state-sponsored APT groups area accused of continuous interferences with 2016 US Presidential Election elections […]

Pierluigi Paganini June 02, 2017
Data Breach – OneLogin Password Manager Hacked

OneLogin company announced on Thursday that it had “detected unauthorised access” in its systems located in the United States. OneLogin is a leading identity and access management software vendor providing an identity-driven enterprise security solution. OneLogin is a popular password manager used by many Internet users to allow management of complex passwords as requested by […]

Pierluigi Paganini June 02, 2017
The Fireball malware already infected more than 250 million computers worldwide running both Windows and Mac OS

Check Point have discovered a massive malware campaign spreading the Fireball malware, it has already infected more than 250 million computers worldwide Security researchers at Check Point have discovered a massive malware campaign spreading the Fireball malware. The malicious code has already infected more than 250 million computers worldwide running both Windows and Mac OS. […]

Pierluigi Paganini June 01, 2017
#Vault7: CIA Pandemic implant turns file servers into malware infectors

Wikileaks released a new lot of documents belonging to the Vault7 dump that details the CIA project codenamed ‘Pandemic implant’ Wikileaks released a new batch of documents belonging to the Vault7 archive related to the CIA project codenamed ‘Pandemic.’ RELEASE: CIA 'Pandemic' Windows infection malware documentation #Vault7 https://t.co/YfxAKT1pog pic.twitter.com/HhmmvUBupi — WikiLeaks (@wikileaks) June 1, 2017 The Pandemic […]

Pierluigi Paganini June 01, 2017
Dark Web users of a child porn website tracked after visiting file sharing site

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The DHS obtained the IP addresses of several suspects that visited a child porn site hosted in the Tor network. According to court filings, the suspects shared links to password-protected child pornography media on the  Ziifile […]

Pierluigi Paganini June 01, 2017
ISIS Publishes Detailed Guide on How to Use Services Like Craigslist to Lure Non-Believers to Their Death

ISIS has released a detailed guide on how to murder non-believers. The tutorial provides advice on how to lure targets via fake ads on websites to kill them. ISIS has released a detailed guide on how to murder non-believers. The tutorial provides advice on how to lure targets via fake ads on websites such as […]

Pierluigi Paganini June 01, 2017
Top Defense contractor left Pentagon docs unsecured on Amazon server

A top defense contractor left tens of thousands sensitive Pentagon documents on Amazon Server Without any protection in places. The popular security expert Chris Vickery discovered more than 60,000 sensitive files belonging to a US military project for the National Geospatial-Intelligence Agency (NGA) left on Amazon cloud storage server without authentication. The documents were reportedly left unsecured on […]

Pierluigi Paganini May 31, 2017
A recently discovered Linux flaw could be exploited by Sudo Users to gain Root Privileges

Security researchers at Qualys Security have discovered a Linux Flaw that could be exploited to escalate privileges and overwrite any file on the filesystem. Security researchers at Qualys Security have discovered a Linux flaw that could be exploited to gain root privileges and overwrite any file on the filesystem on SELinux-enabled systems. The high severity flaw, tracked […]

Pierluigi Paganini May 31, 2017
Judy Doesn’t Love You – Judy Malware has a sweet name but may have infected 36 million users

Experts found a new malware, dubbed Judy malware, in the Play Store, it is designed to infect Android devices and generate false clicks on advertisements. Google is suffering once again from malicious software applications found inside popular apps available on Play store. The new malware – code named “Judy” – is designed to infect Android […]