The hacker Kapustkiy has breached the Venezuela Army and leaked 3000 user records containing personal information such as names, emails, and phones. We left the young hacker Kapustkiy after his hack at the High Commission of Ghana & Fiji in India when he also confirmed to have joined the Powerful Greek Army hacked crew. The hacker breached […]
Ill-intentioned could destroy everything using the USBKill device, including gaming console, mobile devices, Google Pixel and also circuits in modern cars. Ill-intentioned could destroy everything using the USBKill device, including gaming console (Xbox One, PS4), mobile devices, Google Pixel and also circuits in modern cars. The USBKill is manufactured by the Hong Kong-based technology manufacturer USBKill.com, it is […]
Researchers discovered a bug that can be exploited to bypass Apple’s Activation Lock feature and gain access to the homescreen of locked Apple devices. Security experts have discovered a new bug that could be exploited to bypass Activation Lock feature on Apple devices (iPhone, iPad). The bug could allow gaining access to the homescreen of a […]
According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month. How much money earns a cyber criminal? According to a report published by the threat intelligence firm Recorded Future crooks earn between $1,000 and $3,000 a month, but one of five earns $20,000 a month or […]
Experts from the security firm CheckPoint discovered a new Android malware dubbed Gooligan that has already compromised more than a million Google Accounts. Another malware, dubbed Gooligan, is threatening Android users. The Android malware has already compromised more than 1 Million Google accounts. The Gooligan Android malware roots vulnerable Android devices in the attempt of stealing email addresses and authentication […]
Roughly 26,500 accounts of the UK National Lottery players were accessed by cybercriminals, authorities are investigating the case. According to the operator Camelot, roughly 26,500 accounts of the UK National Lottery players were accessed by cybercriminals. The security breach was spotted on November 28th during a routine online security monitoring. “We do not hold full debit card […]
A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. […]
The GCHQ has released the code of a new open source web tool dubbed CyberChef, specifically designed for analyzing and decoding data. Open data are a privileged source for intelligence agencies, almost any government is largely investing in technology to analyze them. Recently the British intelligence Agency, the Government Communications Headquarters (GCHQ), has launched a new […]
Security experts who conducted an audit on cURL discovered nearly a dozen vulnerabilities that were patched in the last release. The cURL (read “see URL”) is an open source command line tool and library designed for transferring data through various protocols. The cURL is included in a wide range of applications, including networking devices, printers, smartphones, IoT devices […]
Deutsche Telekom confirmed that more than 900,000 routers began to have serious problems connectivity problems due to a cyber attack. More than 900,000 routers belonging to Deutsche Telekom users in Germany were not able to connect to the Internet due to an alleged cyber-attack. The affected routers were used by the Deutsche Telekom customers also […]