Hacking

Pierluigi Paganini July 25, 2017
32M is about to become the first in the US to implant a microchip to employees volunteers

The Wisconsin company Three Square Market (32M) is about to become the first in the U.S. to implant microchip to its voluntary employees. In April 2015, the security researcher Seth Wahl implanted an NFC Chip in his hand to bypass security scanners in a high-security environment and exploit Android mobile devices. Wahle used the NFC chip […]

Pierluigi Paganini July 24, 2017
Spring Dragon APT used more than 600 Malware samples in different attacks

The threat actor behind Spring Dragon APT has been developing and updating its wide range of tools throughout the years, new attacks reported in South Asia. According to a new report published by Kaspersky Lab, the China-linked APT group Spring Dragon (aka Lotus Blossom, Elise, and Esile) has used more than 600 malware samples in […]

Pierluigi Paganini July 23, 2017
Expert exploited an unrestricted File Upload flaw in a PayPal Server to remotely execute code

The security researcher Vikas Anil Sharma exploited an unrestricted File Upload vulnerability in a PayPal Server to remotely execute code. The security researcher Vikas Anil Sharma has found a remote code execution vulnerability in a PayPal server. The expert was visiting the PayPal Bug Bounty page using the Burp software, below the response obtained opening the page http://paypal.com/bugbounty/. […]

Pierluigi Paganini July 23, 2017
Hacker BestBuy pleads guilty to hijacking more than 900k Deutsche Telekom routers

The hacker BestBuy pleaded guilty in court on Friday to hijacking more than 900,000 routers from the network of Deutsche Telekom The notorious hacker BestBuy, also known as Popopret, pleaded guilty in court on Friday to hijacking more than 900,000 routers from the network of Deutsche Telekom. The 29-year-old man, whom name wasn’t revealed by authorities. used a custom version of […]

Pierluigi Paganini July 22, 2017
Lloyd’s of London: A massive cyber attack could cause an average of $53 billion of economic losses

A major global cyber attack has the potential to trigger $53 billion of economic losses, the equivalent to a natural disaster like 2012’s Superstorm Sandy. Events like the massive Wannacry attack or the Ukraine power outage raise the discussion about the possible economic losses caused by a cyber attack. According to a new report published by […]

Pierluigi Paganini July 21, 2017
Microsoft sued Fancy Bear to gain control of the domains used in the cyber espionage campaigns

Microsoft used the lawsuit to disrupt a large number of cyber espionage campaigns conducted by infamous Fancy Bear APT hacking group We have discussed several times about hacking back and the case we are going to analyze is a good example of an alternative approach to hit back an APT group. Microsoft used the lawsuit […]

Pierluigi Paganini July 21, 2017
DarkHotel APT group leverages new methods to target politicians

According to Bitdefender, DarkHotel APT is back and it is targeting government employees with an interest in North Korea with a technique dubbed inexsmar. According to the security firm Bitdefender, the DarkHotel APT is back and it is targeting government employees with an interest in North Korea with new techniques. The hackers’ victims have been […]

Pierluigi Paganini July 20, 2017
Tor launches Bug Bounty Program, hackers can earn between $2,000 and $4,000 for high severity flaws

The Tor Project announced the launch of a public bug bounty program. Bug hunters can earn between $2,000 and $4,000 for high severity flaws. It’s official, the Tor Project announced the launch of a public bug bounty program through the HackerOne platform, the initiative was possible with support from the Open Technology Fund. “With support from the […]

Pierluigi Paganini July 20, 2017
A bug in Gnome pic parser can be exploited to run malicious VBScripts

A bug in your image thumbnailer could represent a new attack vector for hackers that can exploit it for script injection. Another day, another bug in a popular application. A bug in your image thumbnailer could represent a new attack vector for hackers that can exploit it for script injection. To create image thumbnails, Gnome Files allows […]

Pierluigi Paganini July 20, 2017
Black Hat is coming and with it a good reason to update your “Broadcom-based” devices

BroadPwn potentially expose to hack millions of Android devices using Broadcom Wi-Fi Chip, update your “Broadcom-based” devices. Black Hat 2017 is debuting in 3 days and with it a potential concern to most of us. It turns out that one of the conference presentations, entitled BROADPWN: REMOTELY COMPROMISING ANDROID AND IOS VIA A BUG IN BROADCOM’S […]