A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold since 1995 Do you have a Volkswagen? A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold since 1995, including models from Audi, Citroen, Fiat, Ford, […]
vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary code. Hackers breached the Steam’s Dota 2 forums and have leaked a couple of million credentials (the archive contains MD5-hashed passwords), but what is happening to forums based on the popular vBulletin CMS? vBulletin forum administrators need […]
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. We did shut down the PSN and Xbox services last year. Could you tell me which his your […]
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections, and run a wide range of attacks. A severe flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into downloads and web pages, and run a wide range of […]
Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows devices. Microsoft has accidentally leaked the Secret keys to Bypass UEFI Secure Boot. The Secure Boot is a UEFI (Unified Extensible Firmware Interface) feature that should prevent the execution of unauthorized code during the boot process. The […]
The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on the zero-day market. Almost every IT giant has launched its bug bounty program, the last in order of time is Apple that last week announced the initiative during the Black Hat Conference. How much is […]
Today I have interviewed Claudio Caracciolo (@holesec) one of the most renowned Security Professional that works like Chief Security Ambassador for ElevenPaths Claudio Caracciolo (@holesec) wrote a book and is known for his effective interpersonal skills and his ability as an international speaker. Enjoy the Interview. You are one of the world’s most talented cyber security […]
The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of HP (Hewlett Packard) and decided to explain concepts of code review to mitigate the risk of this failure and prevent future attacks. “I would like to make it clear, I am writing this report for educational purpose, I contacted HP Security-Team that […]
Today I had a pleasure to speak with a true talent of the hacking community.Nikie, she is an intriguing figure that I want to present you. Enjoy the interview! Hi Nikie, you are a talent of the hacking community, can you tell more about your technical background? When did you start hacking? I wouldn’t call myself […]
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence Can finding zero-day vulnerabilities be as easy as crawling the Darkweb? Security researchers at Arizona State University (ASU) think so and they’re already seeing some success. In a paper titled, “Darknet and Deepnet Mining for […]