Operators behind the Neutrino EK have added the code to exploit an Internet Explorer flaw that  was recently patched with the release of the MS16-053. Operators behind the infamous Neutrino EK have recently added the code to exploit an Internet Explorer vulnerability that was patched with the release of the MS16-053 security bulletin. The MS16-053 bulletin patched […]
The Labs team at SentinelOne recently discovered a sophisticated malware dubbed Furtim specifically targeting at least one European energy company. In May of this year, security researcher Yotam Gottesam with enSilo, began unraveling a mystery that continues to unravel. First reported by FireF0X, a self-proclaimed âex-malware analystâ located in the Russian Federation, the Furtim malware […]
US sentences the Chinese hacker involved in the theft of industrial secrets on the F-22 and F-35 fighter jets, C-17 transport aircraft and F-35 aircraft. The Chinese national Su Bin (also known as Stephen Su and Stephen Subin), 50, has been sentenced to 46 months jail for intellectual property theft. The Chinese hacker admitted having […]
The Stampado ransomware is a new threat available for sale on the Dark Web that was discovered by the experts at Heimdal security. Security experts from the Heimdal security firm have discovered a new strain of ransomware dubbed Stampado that is available for sale on the Dark Web. The Stampado ransomware is offered for sale with a […]
Shard is a free tool that could be used by hackers to discover shared passwords between most popular web services, including Facebook, LinkedIn, Reddit, Twitter, or Instagram. In the past months, we have read about numerous data breaches, LinkedIn, MySpace, VerticalScope are just a few examples of illustrious victims. Hundreds of thousands of millions of credentials have flooded the […]
Following a short disappearance, the xDedic market – the infamous âeBayâ of hacked servers, has made a new appearance on the Tor network. The xDedic market is still offering everyone from entry-level cybercriminals to APT groups fast, cheap and easy access to legitimate organizational servers. The domain (xdedic[.]biz) went offline following a report from Kaspersky […]
Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to take over the mobile devices. Millions of Xiaomi mobile are vulnerable to remote hacking due to a critical remote code execution (RCE) vulnerability that could be exploited by hackers to take over the mobile devices. The […]
Microsoft has just fixed a the CVE-2016-3238 Print Spooler vulnerability that allows attackers to hack any version of Microsoft Windows. The July Microsoft Patch Tuesday includes security bulletins that address 50 security holes. Six security bulletins are rated critical, reading the them one advisory will catch the attention of the reader. Microsoft has fixed a security […]
The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these usersâ online activities. The NSA has gone as far as calling users of products such as The Amnesic Incognito Live System (Tails) and Tor as extremists. Readers of Linux Journal were also […]
Enjoy the interview with Chema Alonso (@chemaalonso), Chief Digital Officer at Telefonica, who is one of the most talented cyber security experts. Chema Alonso is currently Chief Digital Officer at Telefonica, he is one of the most talented cyber security experts, a skilled hacker that is considered a star of the IT security industry. Enjoy the […]