Breaking News

Pierluigi Paganini September 23, 2016
The leak of NSA hacking tools was caused by a staffer mistake

A US investigation into the leak of the NSA hacking tools used by the Agency is focusing on a theory that it was caused by a staffer mistake. The hack of the NSA-linked group Equation Group and the leakage of the NSA hacking tools in its arsenal it probably one the most disconcerting events of the […]

Pierluigi Paganini September 23, 2016
Young hacker Luca Todesco announced the iPhone 7 jailbreak

The popular hacker Luca Todesco (aka @qwertyoruiopz) has announced the existence of the iPhone 7 jailbreak for devices running iOS 10. Only a few hours, this is the time spent by the popular hacker Luca Todesco (aka @qwertyoruiopz) to jailbreak the new and secure iPhone 7. The iPhone 7 was launched by Apple a few days ago and of […]

Pierluigi Paganini September 23, 2016
Hacker Interviews – Toxic Venom from #Z3ro0d3 crew

Today I’ll present the hacker Toxic Venom, a member of P.G.A hacking group that is one of the most active teams in this period You  are a popular hacker that has already participated in several hacking campaigns, could you tell me more. I began hacking 5 years ago. I was drawn by the Anonymous collective as […]

Pierluigi Paganini September 23, 2016
As of October 5, automatic OAuth 2.0 token revocation upon password reset

Google announced a change to its security policy to increase the account security that includes the OAuth 2.0 token revocation upon password reset. Google has finally announced a new OAuth 2.0 token revocation according to its security policy, the company will roll out the change starting on Oct. 5. The change to the Google security policy […]

Pierluigi Paganini September 22, 2016
Yahoo Data Breach, the company confirms the incident that exposed 500M accounts

The announcement about the Yahoo data breach is online, the company confirmed that hackers managed to access data from at least 500 million user accounts. Today I wrote about the imminent announce of the Yahoo data breach related to an incident that resulted in the leakage of 200 million Yahoo account credentials this summer. The company has finally […]

Pierluigi Paganini September 22, 2016
BT Wi-Fi extender, extends to XSS and password changing vulnerabilities

Following an investigation by Pen Test Partners, British Telecom (BT) has released a firmware upgrade for their popular range of Wi-Fi extenders. The investigation uncovered vulnerabilities within the firmware when left the device exposed to possible XSS (Cross Site Scripting) Exploits as well as the ability to change the user’s password without notification. By combining […]

Pierluigi Paganini September 22, 2016
Yahoo is going to confirm the data breach that exposed 200 Million Yahoo accounts

It’s a question of hours, security experts believe Yahoo will confirm the massive data breach that exposed at least 200 Million Yahoo accounts. Yahoo is ready to confirm a massive data breach that affected its service that has exposed several hundred million user accounts. “Yahoo is poised to confirm a massive data breach of its […]

Pierluigi Paganini September 22, 2016
CVE-2016-6374 – Don’t waste time, patch your CISCO Cloud Services Platform

Cisco has issued a security patch to address a remote hijacking vulnerability, tracked as CVE-2016-6374, in the Cloud Services Platform (CSP). This patch is very important, CISCO urges all customers who run CSP 2100 software to install the 2.1.0 update that addresses a “high” risk remote code execution flaw. The CISCO Cloud Services Platform (CSP) is […]

Pierluigi Paganini September 22, 2016
RAUM tool allows to spread malware through torrent files

InfoArmor has discovered the RAUM tool in criminal forums, it is a special tool to distribute malware by packaging it with popular torrent files. It is not a novelty, torrent files are a privileged channel for malware diffusion, according to a study conducted by researchers at Digital Citizens Alliance and RiskIQ, almost one-third of the 800 torrent sites […]

Pierluigi Paganini September 22, 2016
iSpy, a new sophisticated commercial keylogger in the criminal underground

The new variant of the popular iSpy keylogger (version 3.x) was available in the criminal underground with sophisticated features. Security researchers at Zscaler warn of a new sophisticated commercial keylogger dubbed iSpy. The malware is a perfect surveillance tool, it was developed to capture victim’s keystroke and screenshots, access webcam, steal user data and license keys […]