Breaking News

Pierluigi Paganini October 29, 2015
Thousands stolen identities of Britons available on the Darkweb

600k customer identities have been stolen in 2014 and according to government officials thousands of Britons data available for sale in the DarkWeb. The digital identities of tens of thousands of Britons are available for sale on the darkweb, including data belonging to the government personnel. Many experts speculate that the volume of data represents […]

Pierluigi Paganini October 29, 2015
Chikdos cross-platform DDoS botnet hit SQL servers worldwide

Experts at Symantec have discovered a new variant of  the Chikdos DDoS-Trojan that is targeting MySQL servers worldwide. There is a malware in the wild that abuses MySQL Servers for DDoS Attacks, the experts named it Chikdos. The threat was detected for the first time by the Polland CERT and according to the experts it has […]

Pierluigi Paganini October 29, 2015
Shockwave player flaw exposes 450 million users at risk of hack

Adobe has released a critical update to fix a flaw in the Shockwave player that could be exploited to compromise hundreds of millions of machines. Adobe has released a critical update to fix a vulnerability in the Shockwave player (CVE-2015-7649) that could be exploited by threat actors to compromise hundreds of millions of machines. The […]

Pierluigi Paganini October 29, 2015
Iranian Hackers focus their efforts in Android RATs

A research published by RecordedFuture demonstrates that the interest in Android RATs of Iranian Hackers is rising, DroidJack and AndroRAT are most popular. According to the threat researcher Rodrigo Bijou (@rodrigobijou), Iranian malware authors are focusing their efforts on mobile RATs, in particular, malicious codes designed to compromise Android devices. The security experts confirmed that […]

Pierluigi Paganini October 29, 2015
Just $1400 to build an IMSI catcher like device to track phones

A group of researchers demonstrated that it is possible to build a Low-cost IMSI catcher for 4G/LTE networks to track phone locations. IMSI catcher for 4G/LTE networks are very expensive devices that allow tracking phone locations. Now a group of researchers has found a way to track devices using the latest LTE standard for mobile networks, but with a very […]

Pierluigi Paganini October 28, 2015
Free Web Hosting 000Webhost hacked, 13 Million users impacted

Free Web Hosting 000Webhost company hacked, data belonging to more than 13 Million customers have been leaked online by the attackers. Another company has suffered a major data breach, this time in the headlines there is the world’s most popular Free Web Hosting company 000Webhost. The 000Webhost data breach has exposed more than 13.5 Million […]

Pierluigi Paganini October 28, 2015
The US DoD still uses SHA-1 signed certificates for use by military agencies

The United States Department of Defense is still issuing SHA-1 signed certificates for its military agencies, despite they are considered insecure. Today I have published a blog post on the Army Vulnerability Response Program (AVRP), a sort of bug bounty program specific for the US military environment. The idea is to incentive  the ethical disclosure of vulnerabilities […]

Pierluigi Paganini October 28, 2015
Joomla SQL Injection Vulnerability exploited in the wild

Security experts at Sucuri reported a number of attacks exploiting a critical SQL injection flaw recently disclosed in the Joomla Content Management System. A few days ago, security experts disclosed a critical SQL injection vulnerability in the Joomla Content Management System (CVE-2015-7858), but as expected, threat actors in the wild are exploiting it in attacks against websites […]

Pierluigi Paganini October 28, 2015
US Army Experts Call for military bug bounty program AVRP

US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP),  a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]

Pierluigi Paganini October 27, 2015
The Jailbreaking procedure is now legal in the United States

The Copyright Office has granted DMCA exemptions for jailbreaking making the procedure legal in the United States in the next years. Jailbreaking an iOS mobile device it is possible to remove hardware restrictions implemented by the Apple’s operating system, Jailbreaking gives users root access to the iOS file system and manager, this allows them to download and […]