QRLJacking is an attack technique devised by a cyber security researcher to Hijack bypass QR Code Based Quick Login System. Many desktop applications such as Line, WeChat, and WhatsApp allow users to authenticate themself with the Secure Quick Response Login method that relies on QR-code. The QR-code-based authentication system allows users to quickly access a website […]
Today I have interviewed RazorBlade, (@JustAnotherBoat), another hacker involved in several hacking campaigns. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? Which are your motivations? I started hacking about 2 years ago but my curiosity allowed me to gain Alot of experience. What was your […]
Today I have interviewed one of the core members of the popular GhostSquadHackers crew, he is BannedOffLine, the Admin. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? Which are your motivations? I’ve participated in many operations. The one I’m known for was OpIcarus where I’d get in […]
Shad0w Security (Shad0wS3C) claimed responsibility for the data breach of the EJBCA that resulted in the exposure of credentials and certificates. Shad0w Security claimed responsibility for the data breach of the EJBCA – Open Source PKI Certificate Authority. Shad0w Security recently breached into a Switzerland Branch of EJBCA – Open Source PKI Certificate Authority and stole dozens of certificates […]
Security experts at Symantec revealed that the Patchwork hacker crew is now expanding espionage activities on companies in a wide range of industries. Security experts from Symantec have spotted a new cyber espionage campaign managed by the Patchwork group targeting organizations in multiple industries. The hacker crew is a well-known group, its activities are focused on diplomatic […]
Experts discovered that Wireless keyboards from several vendors donât use encryption when communicating with USB dongle being opened to KeySniffer attacks Security experts from Bastille firm have devised a method of attack dubbed KeySniffer to remotely intercept keystrokes or send commands to a targeted computer. The researchers have analyzed non-Bluetooth wireless keyboards from 12 manufacturers discovering that […]
Another interview with one of the black hat hackers on the internet, he is Revolxy from PøwerfulGreÉkArmy hacker crew. Enjoy the Interview. You are a known hacker that has already participated in several hacking campaigns, could you tell me more about. I have participated in campaigns such as #OpTurkey , #OpISIS and #OpPedo. I’m targeting government […]
Today I have interviewed one of the core members of the popular TeaMp0isoN crew, as usual, these chats are very precious for experts that want know more about hacking activities. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? Which are your motivations? My technical background in […]
Another interview with one of the black souls of the Internet, Korrupt, which is involved in various hacking campaigns. Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. I started programming about 12 years ago and became a web developer […]
New evidence collected by investigators suggests that hackers that attacked DNC penetrated deeper than previously thought. In June, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS). CrowdStrikeâs incident response time discovered not one, but two hacking groups that it considers âsome of the best adversaries out of the all […]