Hacking

Pierluigi Paganini June 24, 2017
US intelligence claims Russian hackers probed electoral networks in 21 US states

According to the US intelligence, Russian hackers tried to compromise electoral networks in 21 unnamed US states, but voting tallies hadn’t been hacked. According to Homeland Security officials, the attack against the 2016 Presidential election was more sophisticated than first thought. In a public hearing into the Russian interference in the 2016 Presidential election held by […]

Pierluigi Paganini June 23, 2017
Experts devised the GhostHook Attack technique to bypass Windows 10 PatchGuard Protections

Experts have devised the GhostHook Attack technique to install rootkits on machines running the Windows 10 operating system. Security flaws in Microsoft PatchGuard kernel protection could be exploited by attackers to install rootkits on machines running the secure Windows 10 operating system. The PatchGuard, also known as Kernel Patch Protection, is a software protection utility that been […]

Pierluigi Paganini June 23, 2017
OpenVPN fixed several remotely exploitable flaws that were not detected by recent audits

OpenVPN fixed several vulnerabilities that could be exploited by remote attackers, the flaws were not detected in a recent audit. Recently two distinct audits were conducted to discover security issues in the OpenVPN, many flaws were found but some vulnerabilities were not spotted by the experts. Four of the vulnerabilities in OpenVPN 2.4.2, were found by […]

Pierluigi Paganini June 22, 2017
Drupal fixes the CVE-2017-6922 flaw exploited in spam campaigns in the wild

Drupal team released security updates to fix several vulnerabilities, including the critical access bypass flaw CVE-2017-6922 exploited in spam campaigns. The Drupal development team has released security updates to fix several vulnerabilities, including the critical access bypass flaw tracked as CVE-2017-6922 that has been exploited in spam campaigns. The CVE-2017-6922 flaw was fixed with the […]

Pierluigi Paganini June 22, 2017
Brutal Kangaroo is the CIA tool suite for hacking Air-Gapped Networks

WikiLeaks has published a new batch of Wikileaks documents that detail the Brutal Kangaroo tool suite for hacking Air-Gapped Networks. WikiLeaks has published a new batch of documents belonging to the Vault 7 leak, the last archive includes the documentation related to a tool dubbed Brutal Kangaroo used by the CIA for Microsoft Windows that targets air-gapped […]

Pierluigi Paganini June 22, 2017
Attackers can exploit electronic cigarettes to hack computers

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In November 2014, in a discussion started on the Reddit news media website it has been debated the case of a malware implanted by using electronic cigarettes connected over USB. Hackers are able to exploit any […]

Pierluigi Paganini June 20, 2017
Two Ztorg Trojans Removed from Google Play Store Are Definitely Better

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that could allow attackers to root targeted devices. Most software developers update their apps to patch vulnerabilities and add new features. But when the software is malware, an update could be the worst thing to do. The Google Play […]

Pierluigi Paganini June 20, 2017
Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software

Journalists and activists in Mexico accused the government of spying on them with the powerful surveillance software Pegasus developed by the NSO Group. Journalists and activists in Mexico accused the government of spying on them with a powerful surveillance software. According to the journalists, the authorities used an Israeli spyware to hack their mobile devices. The […]

Pierluigi Paganini June 20, 2017
Stack Clash vulnerability allows an attacker to execute code as root

Stack Clash is a local privilege escalation flaw in Linux, BSD, Solaris and other open source systems that allows an attacker to execute code as root. Linux, BSD, Solaris and other open source systems are vulnerable to a local privilege escalation vulnerability known as Stack Clash that allows an attacker to execute code as root. Stack Clash is […]

Pierluigi Paganini June 19, 2017
Canada’ CSE warns of cyber attacks against next 2019 Election

The Canada Communications Security Establishment (CSE) published a report that reveals that hackers will attempt to hack into 2019 country’s Election. The Canada Communications Security Establishment (CSE) published a report that reveals that cyber criminals and hacktivists had leaked sensitive government documents, and attempted to hack into 2015 country’s Election. The hackers targeted candidates and […]