The United States Department of Justice has gathered evidence to charge at least six Russian government officials involved in the 2016 DNC hack. The United States Department of Justice has gathered evidence to charge at least six Russian government officials involved in the DNC hack during the 2016 Presidential election. In the past months, US intelligence blamed […]
It has happened, one of the most cyber-savvy states, Estonia decided to block Electronic ID Cards over identity theft risk. On Thursday, Estonia announced that it would suspend security digital certificates for up to 760,000 state-issued electronic ID-cards that are using the buggy chips to mitigate the risk of identity theft. The decision comes after IT security researchers recently […]
FireEye CEO Kevin Mandia announced the arrest of LeakTheAnalyst, the hacker who claimed to have breached its systems back in July. Late July a hacker who goes online with the moniker LeakTheAnalyst claimed to have breached FireEye systems. The hacker leaked details alleged stolen from a compromised system maintained by Adi Peretz, a Senior Analyst at Mandiant. The hacker leaked a […]
Attackers scanned for the entire IPv4 range and look for Ethereum miners with open SSH connections. Hackers target Ethereum-mining farms in the attempt to hijack the funds by replacing the userâs wallet with their one. The attacks were first spotted on Monday, threat actors attempted to change the default configuration of Ethereum miners. “Illicit digital currency mining, either directly […]
OpenSSL patches two low and medium severity vulnerabilities that were discovered by using Googleâs open source OSS-Fuzz fuzzing service. The medium severity vulnerability tracked as CVE-2017-3736 was addressed with the release of OpenSSL 1.1.0g and 1.0.2m. The flaw is a carry propagating bug in the x86_64 Montgomery squaring procedure, it affects processors that support BMI1, BMI2 and […]
Let’s see what has happened at Mobile Pwn2Own 2017 competition organized by Trend Microâs Zero Day Initiative (ZDI) at the PacSec conference in Tokyo. Here we are discussing once again of the Mobile Pwn2Own competition organized by Trend Microâs Zero Day Initiative (ZDI) at the PacSec conference in Tokyo. White hat hackers earned more than half a million […]
Crooks continue using skimmers in card frauds, these devices are becoming even more sophisticated, last wave of attacks leverages on so-called Shimmers. Crooks continue to skimmers in payment card frauds, these devices are becoming even more sophisticated. The number of cyber attacks against ATM involving so-called âinsert skimmersâ is increasing. Insert Skimmers are wafer-thin fraud devices designed to fit […]
46.2 Million Malaysian Mobile phone numbers leaked online, authorities confirmed data were stolen from government servers and databases at a dozen telcos. Millions of Malaysians have been affected by a major data breach, hackers have accessed 46.2 million cellphone accounts after they broke into government servers and databases at a dozen telcos in the country. Considering that the population […]
A cybercrime gang called Silence targeted at least 10 banks in Russia, Armenia, and Malaysia borrowing hacking techniques from the Carbanak group. A cybercrime gang called Silence targeted at least 10 banks in Russia, Armenia, and Malaysia borrowing hacking techniques from the dreaded Carbanak hacker group that stole as much as $1 billion from banks worldwide. […]
WordPress developers fixed a serious SQL injection vulnerability on Tuesday with the release of version 4.8.3.. Apply it as soon as possible. WordPress developers fixed a serious SQL injection vulnerability that was reported by the researcher Anthony Ferrara, VP of engineering at Lingo Live. The issue was addressed on Tuesday with the release of version 4.8.3. The vulnerability […]