The government authority who oversees the export of âdual useâ technologies revoked the Hacking Team âs global export license. On July 2015, the Italian surveillance company Hacking Team suffered one of the worst data breaches in the history.  Unknown attackers have exfiltrated some 400Gbs of data, including internal emails, exploit source code and invoices. A few months […]
Whatsapp now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. Great news for privacy advocates and WhatsApp users, the software now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. On Tuesday, the company announced the significant improvement to its 1 billion users with a blog […]
A new Flash Player zero-day vulnerability (CVE-2016-1019) has been actively exploited by threat actors in attacks against systems running Windows XP and 7. Once again a zero-day vulnerability in the Adobe Flash Player 21.0.0.197 is threatening Internet users worldwide. The news was spread by Adobe that issued a security alert on Tuesday anticipating an imminent […]
iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access […]
According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD) Â database is open to intrusion. According to the results of an internal review of the US State Department, the Consular Consolidated Database (CCD) is vulnerable to cyber attacks. The State Department considers the CCD as an âunclassified but […]
The federal bureau of investigation issued an alert related the APT6 state-sponsored hacking group that has compromised the US Government networks for years. The FBI revealed that âa group of malicious cyber actors have compromised and stolen sensitive information from various government and commercial networksâ since at least 2011. The alert was published online by AlenVault […]
Two forensics experts have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the compromised machine. At the last Black Hat Asia, the forensics experts Matt Hastings and Ryan Kazanciyan from Tanium have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the compromised machine. The DSC […]
Which is the source of Panama Papers? According to Mossack the hackers breached its systems, according to the experts its email server was breached. The Panama Papers is a huge trove of strictly confidential documents from the Panamanian law firm Mossack Fonseca was leaked online during the weekend, it is largest data leaks ever. The entire archive […]
A flaw in the family of CISCO FirePower Firewall devices allows malware to bypass detection mechanism. Cisco is releasing security updates to fix a critical vulnerability (CVE-2016-1345) that affects one of its newest products, the FirePower firewall. The flaw has been discovered by security researchers at Check Point Security. According to the security advisory published by […]
A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a recycled archive? Details of almost 50 Million Turkish citizens have been leaked online, the bulk data was hosted on a server with the IP address 185.100.87.84. The archive was published during the weekend, the publishers claim they it belongs […]