Hacking

Pierluigi Paganini March 22, 2017
New Metasploit RFTransceiver extension allows testing IoT sevices

Metasploit RFTransceiver extension implements the Hardware Bridge API that will allow organizations to test wireless devices operating outside 802.11 spec. Recently we reported the news of the availability of a new hardware bridge for Metasploit extension to test hardware, including IoT devices. We have to consider that IoT devices are pervading our day life such as into […]

Pierluigi Paganini March 21, 2017
Exclusive: Dirty Political Spying Attempt behind the FHAPPI Campaign: all the details in the interview with @unixfreaxjp

The role of China (PRC) in the worldwide cyber espionage game of conditioning political life: when reserved information are brandished against the political opponent. In the days of testimony of U.S. Federal investigators about the role played during the last year by Russians, their alleged cyber operation is once again under examination. The mainstream media […]

Pierluigi Paganini March 21, 2017
Over 20 million Gmail and 5 million Yahoo accounts available for sale on the Dark Web

The vendor “SunTzu583” is offering for sale over 20 million Gmail and 5 million Yahoo login credentials on the Dark Web A vendor with the online moniker “SunTzu583” is reportedly selling millions of login credentials for Gmail and Yahoo accounts on a black market in the dark web. Over 20 million Gmail accounts and 5 million […]

Pierluigi Paganini March 21, 2017
McDonald’s McDelivery app leaks details of over 2.2 million customers

The McDelivery application used by McDonald’s customers in India was found to be leaking the personal data of more than 2.2 million users. McDelivery is a web application used by McDonald’s customers in India that was found to be leaking the personal information of more than 2.2 million users. The issue was discovered by researchers at security […]

Pierluigi Paganini March 20, 2017
CIA Vault7 Leak – Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution flaw

After the leak of the CIA Vault7 archive, experts from CISCO warn of Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution flaw. Recently Wikileaks announced it is planning to share with IT firms details about vulnerabilities in a number of their products, the flaw are exploited by the hacking tools and […]

Pierluigi Paganini March 20, 2017
Researcher leveraged App Paths to bypass User Account Control in Windows 10

The security expert Matt Nelson has devised a new method that leverages App Paths to bypass the User Account Control (UAC) only on Windows 10. The researcher detailed a bypass technique that is quite differed to the previous ones he devices, the new method “doesn’t rely on the IFileOperation/DLL hijacking approach”. “I’ve previously blogged about two different bypass techniques, […]

Pierluigi Paganini March 19, 2017
Fappening 2.0 – More explicit pictures of celebrities leaked online

Fappening 2.0, Nude pictures of several celebrities have been leaked online, including Rose McGowan, Amanda Seyfried and Jillian Murray. Here we are speaking again of Fappening, new nude pictures of celebrities have been leaked online. In 2014 for the first time, several lots of private photographs of celebrities were leaked online, the phenomenon was dubbed […]

Pierluigi Paganini March 18, 2017
WikiLeaks will disclose CIA exploits to tech companies under specific conditions

Assange sent an email to tech firms including “a series of conditions” that they need to fulfill before gaining access to details included in the Vault 7. A couple of weeks ago Wikileaks published the Vault 7 archive, a huge trove of files detailing CIA hacking tools and capabilities. The files allegedly originated from a high-security […]

Pierluigi Paganini March 17, 2017
Global DDoS Threat Landscape Q4 2016 – US, UK and Netherlands top attacked countries

Imperva published the Global DDoS Threat Landscape Q4 2016, according to the experts the US, the UK and Netherlands are top attacked countries. Distributed denial of service (DDoS) attacks continue to represent a serious threat to organizations worldwide. The attacks are growing in size and level of sophistication according to the new report ‘Global DDoS Threat […]

Pierluigi Paganini March 17, 2017
New APT Campaign based on Poison Ivy RAT with C&C in China has been reversed by MalwareMustDie

New APT Campaign based on Poison Ivy RAT with C&C in China has been reversed by MalwareMustDie who shared a lot of interesting details about the attack vectors and reverse techniques. Our travel along the great analysis of a fresh, new insidious APT China campaign. An ordinary case of phishing? At the beginning, it seemed […]