A security expert revealed a number of flaws in the big playerâs two-factor authentication methods that could allow crooks to steal money. Social media bug bounty hunter, Arne Swinnen, has revealed a number of flaws in the big playerâs 2 factor authentication (2FA) methods that could enable a malicious user to illicit large sums of […]
Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in the energy industry Recently, experts from the SentinelOne security firm spotted a sophisticated malware dubbedSFG, a spawn of Furtim malicious code, targeting at least one European energy company. Media speculated the existence of a powerful SFG […]
Colleagues at HackRead discovered a seller using the pseudonym of ‘DataDirect’ offering US voters’ registration records on a black marketplace. On the Dark Web is quite easy to find any kind of data, recent data breaches have literally flooded the principal black markets. Recently, colleagues at HackRead discovered a seller using the pseudonym of ‘DataDirect’ […]
Enjoy the interview with Zeus Anon to understand which phenomena are influencing the cyberspace and how hackers are fighting the ISIS online propaganda. I’m continuing to interview hackers that every day fight against the ISIS supporters, people that live in the shadow that are engaged in hard battles. Enjoy the interview! Hi Zeus, first of […]
Data breaches in the healthcare sector are fueling the dark web, millions of people’s medical records are offered for sale in the dark side of the internet. In the past several years, security pundits have been predicting that the healthcare sector was going to be the hotbed of cyber threat activity. These predictions go back […]
The popular OpenSSH is affected by a user enumeration bug that could be exploited by a remote attacker to check a list of hacked credentials. A bug (CVE-2016-6210) in the popular OpenSSH crypto library could be exploited by a remote attacker to enumerate users on systems running SSHD. An attacker can exploit the bug to check […]
DARPA organized a challenge where 7 finalists will battle it out with the Artificial Intelligence system to detect flaws and scan networks for exploits. The Rio Olympics 2016 is something everyone is looking forward to. The sportsmanship, the record making, medals the spirit of the game and the hilarious doping scandals like the 1920’s grafting […]
Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan that prevents users from calling banks. Security experts from Symantec have spotted a new strain of mobile Trojan dubbed Android.Fakebank.B that prevents users from making outgoing calls to banks from their mobile devices. Android.Fakebank.B was first spotted in October 2013, it was able to […]
Today, thanks to the support of Sneaker, I have interviewed the hacker that goes online with the pseudonym of Mr Xer . I’m continuing to interview hackers that try to destroy the online propaganda of the Islamic State, people that are involved in a silent battle that many people still ignore. Today I’ll present you […]
Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million theft. Law enforcement in Taiwan investigating the attacks against ATMs of a major nations bank, the Taiwan’s First Bank. Crooks used a malware to withdraw more than $2 million from dozens of ATMs in the country, it […]