Breaking News

Pierluigi Paganini July 26, 2016
Europol and IT security firms united against the ransomware

The No More Initiative aims to spread information about ransomware and the risk of exposure,providing suggestions to avoid falling victim to the threat. A joint operation conducted by the Europol with police and cyber security firms worldwide aims to tackle the Ransomware threat. It has been estimated that the ransomware victims tripled in the first quarter of […]

Pierluigi Paganini July 26, 2016
Hackers are offering for sale O2 customer data on the dark web

O2 customer data that was reportedly first stolen from the gaming site XSplit in November 2013 are now offered for sale on the Dark Web. In the dark web it is possible to find any kind of illegal product and services, from weapons to payment card data, last disconcerting discovery is related to the availability of O2 customer data in the […]

Pierluigi Paganini July 26, 2016
Hacker Interviews – Korrupt

Another interview with one of the black souls of the Internet, Korrupt, which is involved in various hacking campaigns. Enjoy the Interview.   You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I started programming about 12 years ago and became a web developer […]

Pierluigi Paganini July 26, 2016
DNC hackers’ attack was deeper than previously thought

New evidence collected by investigators suggests that hackers that attacked DNC penetrated deeper than previously thought. In June, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS).  CrowdStrike’s incident response time discovered not one, but two hacking groups that it considers “some of the best adversaries out of the all […]

Pierluigi Paganini July 25, 2016
Researchers exploited PHP Zero-Days to Hack PornHub

A team of researchers has found a couple of critical flaws in PHP and exploited them to hack PornHub, on one of the most popular adult websites. Diclaimer: This article is written to discuss the security implications and technical aspects of a hack that was recently done. If you by anyway are offended by the […]

Pierluigi Paganini July 25, 2016
Munich Gunman purchased the weapon on the Dark Web

David S., the Munich gunman has purchased the weapon on the Dark Web, sincerely I was waiting for this title in the headlines, but … In Germany, it is quite difficult to pay for weapons so how the Munich gunman got a 9mm Glock 17? According to several German news outlets, the young man has bought the 9mm […]

Pierluigi Paganini July 25, 2016
Hacker Interviews – Zilla from GhostSquadHackers

Enjoy my interview with the Zilla from GhostSquadHackers, I believe it is essential for cyber security experts to know how hackers work and why some of them are hunting the ISIS online. Zilla is another member of the #GhostSquadHackers, one of the hacker crews most active against IS propaganda online. You are a popular talented hacker […]

Pierluigi Paganini July 25, 2016
Bug hunter downloaded the entire Vine source code

The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy. A hacker has accessed and downloaded the source code of the Twitter’s Vine application. Vine is a short-form video sharing service, acquired by Twitter in 2012, that allows users to share small videos of 6 seconds […]

Pierluigi Paganini July 24, 2016
Hacker Interviews – NeckrosTheTerrible

Let’s continue the series of interviews with talented hackers some of them like NeckrosTheTerrible are involved in anti-ISIS campaigns. NeckrosTheTerrible is a member of #GhostSquadHackers and currently involved in the #opTurkey campaign. Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I been hacking […]

Pierluigi Paganini July 24, 2016
Akamai Threat Advisory – Evolution of DDoS attacks

According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today. The Morris Worm of 1989 caused massive damage and losses with its unintentionally caused Denial Of Service (DoS) attacks. Fast forward to today, attacks have sharpened teeth targeting almost every IT service, from telco to gaming firms. […]