The notorious Romanian hacker Guccifer has been sentenced to 52 months in prison by a US court for aggravated identity theft and hacking. The notorious Romanian hacker Guccifer has been sentenced to prison by a US court. Marcel Lehel Lazar (44), this is the real name of Guccifer, has been sentenced to 52 months in prison […]
Apple issued security fixes for Mac OS X and Safari to patch zero-day flaws exploited by Pegasus spyware to spy on mobile users. A few days ago, we reported a detailed analysis of the Trident exploit that triggers three vulnerabilities in order to remotely hack Apple mobile devices through the installation of the Pegasus spyware. The […]
According to the breach notification service LeakedSource roughly 43 million Last.fm accounts were compromised in a 2012 incident. In June 2012, the online music service Last.fm was compromised by hackers, in response the company notified the incident to its users inviting them to change their passwords. Some experts speculated the security breach took place several […]
Today I have the pleasure to share with you the interview with one of the most popular Spanish cyber security experts, Lorenzo Martinez. Enjoy it! Lorenzo Martinez is the CTO of Securizame, a Spanish security company fully oriented to consultancy, ethical hacking, forensics and security trainings. He is also one of the four editors and […]
In response to the numerous data breaches suffered by other services, the music streaming service Spotify forced a password reset for a number of users. In the last months, numerous IT companies suffered a major data breach, including Dropbox, LinkedIn, MySpace, VK.com, and Tumblr. The criminal underground is flooded by login credentials from the above services that offered for sales by hackers. […]
A group of Israeli researchers has devised a new technique dubbed USBee to hack air-gapped networks and exfiltrate information. Mordechai Guri, head of  R&D at Ben-Gurion’s Cyber Security Center and the chief scientist officer at Morphisec Endpoint Security, and his team have devised a new technique dubbed USBee to hack air-gapped networks and exfiltrate information. […]
NorthScripts is one of the members of the PøwerfulGreÉkArmy hacker group, a young team that conducted several hacking campaigns against multiple targets. Enjoy the interview! Could you tell me more about you? Could you tell me which his your technical background and when you started hacking? I started hacking in 2013, but got better in 2015 when I […]
A DropBox data breach occurred in 2012 is forcing the company to reset login passwords for users included in a data dump leaked online. Another clamorous data breach is in the headlines, a data dump containing more than 68 Million account credentials for online cloud storage platform Dropbox was leaked online. Earlier this week, Dropbox […]
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group. Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers say itâs belonging to an exploit infrastructure connected to the NSO […]
Saudi government facilities have been hit cyber attacks, the Government is investigating with the support of Saudi cyber experts. Saudi government facilities have been targeted by major cyber attacks, in response, the Government has convened a group of cyber experts to examine the events. According to the Saudi Press Agency, Saudi cyber experts held urgent talks […]