SAP fixed a vulnerability affecting SAP MII can be used as a starting point of multi-stage attacks aiming to get control over plant devices and manufacturing systems. SAP fixed a critical vulnerability in its application that could be exploited by hackers, especially nation-state actors, to compromise industrial manufacturing software. SAP issued a critical software update that […]
Security Experts at ESET security firm discovered a new variant of a known trojan disguised as a Facebook Hacking Tool. Security researchers at ESET have published an interesting post about a new Facebook hacking tool. I receive every week dozen emails requesting me instruction to hack Facebook accounts. The hacking tool recently discovered is not […]
In the following brief I will describe kinetic plot based modern terrorism/Cyber-terrorism and religious affiliations. Both Jihadist and Non-Jihadist, organized crime associations, data and statistics to show that Radical Muslim Terrorism is the most prominent form in America today. Modern terrorism and cyberterrorism display the use of violence and threats to intimidate or coerce, normally […]
The T9000 backdoor discovered by PaloAlto Networks is able to infect victims’ machines to steal files, take screengrabs, and records Skype conversations. A new threat is targeting Skype users, it is a backdoor trojan dubbed T9000 that is able to infect a victimâs machine to steal files, take screengrabs, and record conversations. The T9000 backdoor was spotted […]
A hacker accessed an employee’s email account at the Department of Justice and stole 200GB of files including records of 9,000 DHS staffers and 20,000 FBI employees. Yesterday, the data related a Department of Homeland Security (DHS) staff directory were leaked online, a Twitter account shared the link to an archive containing 9,355 names. The responsible […]
The reuse of login credentials on Taobao exposed more than 20 million accounts on Alibaba’s websites to attacks. According to the state media reports, hackers have targeted over 20 million active accounts on Alibaba Group’s Taobao e-commerce website using Alibaba’s own cloud computing service. The Chinese Giant detected the attack in “the first instance” and responded […]
Russian authorities raided offices of a Russian film distribution and production company as part of an operation against the Dyre gang. Russian law enforcement and intelligence agencies in November raided offices of a Russian film distribution and production company as part of an operation against one of the world’s most notorious cybercrime ring. The authorities […]
A security expert discovered an authentication bypass vulnerability in both iOS devices that allows thwarting lock screen passcode. The security researcher Benjamin Kunz Mejri from Vulnerability Laboratory has discovered an authentication bypass-sized hole in both iPhones and iPads running iOS 8 and iOS 9 that can be exploited by attackers to thwart lock screen passcode. This […]
Google announced to have patched a number of critical vulnerabilities affecting the Nexus devices that lead to the complete hack of the device. Google announced to have patched a critical vulnerability affecting the Nexus devices that could be exploited by an attacker on the same Wi-Fi network. The company confirmed that it is not aware […]
Operators running websites based on the WordPress must be aware of a spike in the number of compromised platforms used to deliver the TeslaCrypt ransomware. Administrators running websites based on the popular WordPress CMS must be aware of a spike in hacks that are resulting in the silent delivery of ransomware to the visitors. According to […]