A hacker leaked a data dump containing more than 320,000 Financial Records apparently stolen from an Israeli payment processor. Another data breach is in the headline, roughly 324,000 financial records have been leaked online. The financial data appears to have been stolen either from payment processor BlueSnap or its customer Regpack, a hacker published a link to the archive (a file Titled […]
The Israeli law enforcement arrested two youngsters suspected of operating the infamous vDoS booter. Israeli authorities have arrested two alleged operators of a DDoS service, named vDOS, as the result of an investigation conducted by the FBI. The popular security investigator Brian Krebs reported that the duo behind the vDOS booter service had earned more than $600,000 […]
Today I have the pleasure to share with you the interview with Francisco Francisco J. Rodriguez. He is a member of the Spanish Cyber Security Institute, Cybersecurity and Cybercrime Research and collaborating with State security forces. His twitter @0fjrm0 and his talk about Real Time Cyberattacks at https://goo.gl/ge6G9i You are one of the world’s most talented […]
Vxers developed a new version of GovRAT, called GovRAT, that has been used to target government and many other organizations in the US. GovRAT is an old cyberespionage tool, it has been in the wild since 2014 and it was used by various threat actors across the years. Security experts from the threat intelligence company […]
A security researcher disclosed a critical MySQL zero-day affecting all the default configuration of all MySQL versions including 5.5, 5.6 and 5.7. The security researcher Dawid Golunski has disclosed a critical zero-day vulnerability affecting the popular database management system (RDBMS) MySQL. The researcher decided to disclose the critical flaw because Oracle failed to release a […]
Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software. Recently, the iPhone hack carried out with the NSO Group‘s Pegasus raised the debate about the use of surveillance software. Who uses them? How? Are we able to defend our machines from a so invasive surveillance? NSO Group is […]
The Payment Card Industry Security Standards Council (PCI Council) updates its standard to reduce fraudulent activities against PoS systems. The number of credit card frauds involving Point-of-Sale continues to increase, in the last months, numerous attacks targeted retails and hotels worldwide. The Payment Card Industry Security Standards Council (PCI Council) has responded with the definition […]
Everyone is a potential victim, even the wannabe hackers that try to exploit Facebook Hacker Tools to hack into friends’ accounts. When dealing with cybercrime everyone, is a potential victim, even the hackers, this is the case of a Crimeware-as-a-Service hack that turns wannabe crooks into victims. For those who are looking to hack the Facebook accounts […]
Experts from Sophos discovered Mal/Miner-C, a malware designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. The experts discovered that the new […]
Every collective has its tactics and tools, Today I’ll present you Anonandmore, a hacker that is very active online. Enjoy the Interview. You are a talented hacker that is very active online, could you tell me more about you. Could you tell me which his your technical background and when you started hacking? I started […]