Breaking News

Pierluigi Paganini August 12, 2016
Information warfare – The Rise of the Cyber Offense

Information warfare – The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even more at risk. By the mid-1990’s the US intelligence agencies, especially the NSA, were beginning to wake up to a grim reality – the world was quickly becoming connected and the tools to connect that […]

Pierluigi Paganini August 12, 2016
How to open 100 Million Volkswagen cars with a cheap wireless device

A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold since 1995 Do you have a Volkswagen? A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold since 1995, including models from Audi, Citroen, Fiat, Ford, […]

Pierluigi Paganini August 11, 2016
Patch your vBulletin forum asap to avoid being hacked

vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary code. Hackers breached the Steam’s Dota 2 forums and have leaked a couple of million credentials (the archive contains MD5-hashed passwords), but what is happening to forums based on the popular vBulletin CMS? vBulletin forum administrators need […]

Pierluigi Paganini August 11, 2016
Hacker Interviews – RootPhantom from Phantom Squad

Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview!   You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. We did shut down the PSN and Xbox services last year. Could you tell me which his your […]

Pierluigi Paganini August 11, 2016
Serious Linux design flaw CVE-2016-569 allows Traffic Hijacking

A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections, and run a wide range of attacks. A severe flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into downloads and web pages, and run a wide range of […]

Pierluigi Paganini August 11, 2016
Backdoor keys allow attackers to the bypass UEFI Secure Boot

Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows devices. Microsoft has accidentally leaked the Secret keys to Bypass UEFI Secure Boot. The Secure Boot is a UEFI (Unified Extensible Firmware Interface) feature that should prevent the execution of unauthorized code during the boot process. The […]

Pierluigi Paganini August 10, 2016
Exodus announces a bug bounty program. Who will pay more for a zero-day?

The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on the zero-day market. Almost every IT giant has launched its bug bounty program, the last in order of time is Apple that last week announced the initiative during the Black Hat Conference. How much is […]

Pierluigi Paganini August 10, 2016
Hacker Interviews – Claudio Caracciolo

Today I have interviewed Claudio Caracciolo (@holesec) one of the most renowned Security Professional that works like Chief Security Ambassador for ElevenPaths Claudio Caracciolo (@holesec)  wrote a book and is known for his effective interpersonal skills and his ability as an international speaker. Enjoy the Interview. You are one of the world’s most talented cyber security […]

Pierluigi Paganini August 10, 2016
Linux.Lady, a Go-based Linux Trojan that mines cryptocurrency

Russian antivirus company Doctor Web discovered a new Linux Trojan dubbed Linux.Lady that is used by crooks to mine cryptocurrency. According to a new report published by the antivirus company Doctor Web, a Go-Based Linux Trojan, Dubbed Linux.Lady.1, is exploited by cyber criminals for cryptocurrency mining. “Doctor Web analysts have detected and examined a new Linux Trojan which […]

Pierluigi Paganini August 10, 2016
Security Researcher found vulnerabilities on the HP Website

The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of HP (Hewlett Packard) and decided to explain concepts of code review to mitigate the risk of this failure and prevent future attacks. “I would like to make it clear, I am writing this report for educational purpose, I contacted HP Security-Team that […]