Today Iâll present you AnonRising IRC, a very active collective of hacktivist that participated in the major hacking campaigns. Enjoy the interview You and your AnonRising IRC team are talented hackers that have already participated in several hacking campaigns, could you tell me more about you? We have participated in many operations list is below […]
Malware researchers from Kaspersky Lab confirmed the existence of an OS X variant of the Mokes backdoor discovered in January by Kaspersky. Malware researchers from Kaspersky Lab confirmed the existence of an OS X variant of a recently discovered family of cross-platform backdoors. The backdoors family was named Mokes and a strain of malware was […]
Chief of the National Intelligence declared Russia hacks US computer networks âall the time,â while also seeking to reassure the situation is under control. The recent string of attacks against people and systems involved in the 2016 Presidential election is alarming the US intelligence. After the attacks against the Democratic National Committee, security firms and government experts collected […]
The CVE-2016-3862 flaw is a remote code execution vulnerability that affects the way images used by certain Android apps parsed the Exif data. Are you an Android user? I have a bad news for you, an apparently harmless image on social media or messaging app could compromise your mobile device. The last security updates issued by […]
The security expert and blogger Rob Fuller demonstrated how sniff credentials from a laptop via Ethernet adapter on USB, even if the PC is locked. The security expert and blogger Rob Fuller demonstrated how to exploit a USB SoC-based device to sniff credentials from a locked laptop. The expert has modified the device in a […]
Today I’ll present you  @h0t_p0ppy, a skilled online hacktivist that participated in the major hacking campaigns, including#OpWhales, #OpSeaWorld, #OpKillingBay, and #OpBeast, Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I have participated in campaigns against animal abuses. There are many ops for […]
CSTO ransomware it is able to query the Google Maps API to discover the victim’s location and connects to the C&C via UDP. Ransomware is considered by the security experts one of the most dangerous threats to Internet users and organizations across the world. Malware authors are developing new malicious codes that implement new features […]
Security researchers from TrendMicro have published an interesting analysis on the Linux Umbreon rootkit, a new malware developed by a Pokemon-fan VXer. Malware researchers from TrendMicro have obtained samples of a new strain of Linux rootkit from one of its trusted partners. The new rootkit family was called Umbreon (ELF_UMBREON family), from the name of one of […]
The Europol processed 1 677 media content and social media accounts in six languages containing violent online terrorist propaganda. Recently the European law enforcement agency EUROPOL announced the constitution of a cyber unit focused on fighting the online terrorist propaganda. The Agency now announced to have processed 1677 media content and social media accounts in […]
The data breach notification service announced the Rambler.ru data breach, more than 98 million CLEARTEXT passwords were leaked online. While I was writing about the BuzzersForum data breach, the news of another clamorous incident is circulating online, this time, the victim is of the  Russian biggest web portals, Rambler.ru. Rambler.ru is one of the largest websites in […]