The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group. In the last days of April, Flashpoint a global leader in Deep and Dark Web data and intelligence published a report that is dedicated to the analysis of cyber capabilities of the ISIS with the […]
Microsoft issued a detailed report on the activity of the hacking crew dubbed Platinum APT group that leveraged a Windows patching system in its attacks. The hacker crew discovered by Microsoft and dubbed Platinum APT group conducted cyber espionage against organizations in South and Southeast Asia leveraging a Windows patching system. According to Microsoft, the Platinum has […]
Pro-ISIS hackers belonging to the United Cyber Caliphate issue a kill list that includes dozens of U.S. government personnel. A few days ago, the US Government announced the first attack conducted by the Cyber Command against members of the ISIS online. The US Cyber Command will run hacking operations and use cyber weapons to destroy computer […]
Who are we? Garage4hackers is one of the oldest open information security community for Information Security enthusiast and aspirants on the internet. We started off as an Orkut Community “Hackers Garage” back in 2007 and today we have more than 6K members sharing knowledge across various fields of infosec. “Our mission is to spread Infosec […]
Blue Coat spotted a new ransomware-based campaign serving the Dogspectus malware. Crooks combined a Hacking Team exploit and the Towelroot exploit. Security experts at Blue Coat have spotted a new campaign spreading an Android Ransomware dubbed Dogspectus. The malicious code hijacks mobile advertisements to scam gift cards, it locks the device in a state that allows only […]
Experts at Malwarebytes observed a new attack pattern that relies on fake social button plugin that redirects visitors to Angler Exploit Kit. Cyber criminals continue to use compromised websites to serve malware or to redirect visitors to domains hosting exploit kits. Experts at Malwarebytes observed a new attack pattern that relies on a domain name to lure […]
The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the Cyber Command. The US Government has launched its cyber offensive against the coordinated by the Cyber Command. The strategy is clear, the use of hacking operations and cyber weapons will aim to destroy computer systems […]
A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to their privacy and security. A feature in the last version of Ubuntu, the Ubuntu 16.04 version, could inadvertently expose users private data posing a serious threat to their privacy. According to the open-source software expert […]
Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering is frequently mentioned in the context of illegal activity: the stealing of IP, fraud with software licenses, and so forth. At the same time, reversing has legal applications, the most known of which is malware research. […]
The native Windows command-line utility Regsvr32 can be exploited to bypass MS Applocker and run remote code bypassing protection mechanisms. A security researcher recently discovered a vulnerability that may very well reap chaos in the Windows world, it can be used to bypass whitelisting protections such as Microsoftâs AppLocker. The Microsoft digitally-signed binary is a […]