Hacking

Pierluigi Paganini June 25, 2017
UK Parliament shut down external access to email accounts after cyberattack

The UK Parliament has suffered the biggest ever cyber attack against the email systems, it shut down external access to mitigate the threat. The UK Parliament has shut down external access to e-mail accounts on Saturday after a cyberattack. According to the authorities, the attack was “sustained and determined,” hackers launched a prolonged brute-force attack against […]

Pierluigi Paganini June 24, 2017
Stealing AES-256 keys in seconds using €200 of off-the-shelf components

Security experts at Fox‑IT have demonstrated that is possible sniff AES-256 encryption keys from a distance of one meter (3.3 feet) with a cheap equipment. Security experts at Fox‑IT have demonstrated that is possible to power a side-channel attack to wirelessly extract secret AES-256 encryption keys from a distance of one meter (3.3 feet). The […]

Pierluigi Paganini June 24, 2017
32TB of Windows 10 internal builds and portions of core source code leaked online

A massive dump of Microsoft’s confidential Windows 10 internal builds, and the source codes for private software has been leaked online. A huge trove of Microsoft internal Windows operating system builds and portions of core source code have leaked online. The news was first reported by The Register, the 32TB of official and non-public installation images […]

Pierluigi Paganini June 24, 2017
US intelligence claims Russian hackers probed electoral networks in 21 US states

According to the US intelligence, Russian hackers tried to compromise electoral networks in 21 unnamed US states, but voting tallies hadn’t been hacked. According to Homeland Security officials, the attack against the 2016 Presidential election was more sophisticated than first thought. In a public hearing into the Russian interference in the 2016 Presidential election held by […]

Pierluigi Paganini June 23, 2017
Experts devised the GhostHook Attack technique to bypass Windows 10 PatchGuard Protections

Experts have devised the GhostHook Attack technique to install rootkits on machines running the Windows 10 operating system. Security flaws in Microsoft PatchGuard kernel protection could be exploited by attackers to install rootkits on machines running the secure Windows 10 operating system. The PatchGuard, also known as Kernel Patch Protection, is a software protection utility that been […]

Pierluigi Paganini June 23, 2017
OpenVPN fixed several remotely exploitable flaws that were not detected by recent audits

OpenVPN fixed several vulnerabilities that could be exploited by remote attackers, the flaws were not detected in a recent audit. Recently two distinct audits were conducted to discover security issues in the OpenVPN, many flaws were found but some vulnerabilities were not spotted by the experts. Four of the vulnerabilities in OpenVPN 2.4.2, were found by […]

Pierluigi Paganini June 22, 2017
Drupal fixes the CVE-2017-6922 flaw exploited in spam campaigns in the wild

Drupal team released security updates to fix several vulnerabilities, including the critical access bypass flaw CVE-2017-6922 exploited in spam campaigns. The Drupal development team has released security updates to fix several vulnerabilities, including the critical access bypass flaw tracked as CVE-2017-6922 that has been exploited in spam campaigns. The CVE-2017-6922 flaw was fixed with the […]

Pierluigi Paganini June 22, 2017
Brutal Kangaroo is the CIA tool suite for hacking Air-Gapped Networks

WikiLeaks has published a new batch of Wikileaks documents that detail the Brutal Kangaroo tool suite for hacking Air-Gapped Networks. WikiLeaks has published a new batch of documents belonging to the Vault 7 leak, the last archive includes the documentation related to a tool dubbed Brutal Kangaroo used by the CIA for Microsoft Windows that targets air-gapped […]

Pierluigi Paganini June 22, 2017
Attackers can exploit electronic cigarettes to hack computers

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In November 2014, in a discussion started on the Reddit news media website it has been debated the case of a malware implanted by using electronic cigarettes connected over USB. Hackers are able to exploit any […]

Pierluigi Paganini June 20, 2017
Two Ztorg Trojans Removed from Google Play Store Are Definitely Better

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that could allow attackers to root targeted devices. Most software developers update their apps to patch vulnerabilities and add new features. But when the software is malware, an update could be the worst thing to do. The Google Play […]