The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of HP (Hewlett Packard) and decided to explain concepts of code review to mitigate the risk of this failure and prevent future attacks. “I would like to make it clear, I am writing this report for educational purpose, I contacted HP Security-Team that […]
Today I had a pleasure to speak with a true talent of the hacking community.Nikie, she is an intriguing figure that I want to present you. Enjoy the interview! Hi Nikie, you are a talent of the hacking community, can you tell more about your technical background? When did you start hacking? I wouldn’t call myself […]
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence Can finding zero-day vulnerabilities be as easy as crawling the Darkweb? Security researchers at Arizona State University (ASU) think so and theyâre already seeing some success. In a paper titled, âDarknet and Deepnet Mining for […]
Experts from Checkpoint have found four major vulnerabilities dubbed Quadrooter in Qualcomm chips that expose more than 900M Android users to hack. Security experts from the security firm Checkpoint have found four major vulnerabilities, dubbed Quadrooter, in the firmware running on the in the Qualcomm chips that equip modern Android devices. The Quadrooter flaws could be […]
The systems of the Oracle MICROS payment terminals division have been infected by a malware, systems worldwide are potentially at risk. The hack that I’m going to tell you could have a serious and a huge impact, the systems of the Oracle MICROS payment terminals division have been infected. MICROS is among the top three […]
Today I have interviewed The Phantom Squad, one of the most dreaded groups of hackers on the Internet. Enjoy the Interview. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. We started in November 2015. We have taken down PSN and have also targeted other […]
Experts spotted a previously unknown APT group dubbed Strider or ProjectSauron that carried out surgical cyber-espionage attacks against targets worldwide. A previously unknown hacking group variously dubbed ‘Strider’ or ‘ProjectSauron’ has been conducting a surgical cyber espionage campaign against targets in Russia, Belgium, China, Iran, Sweden, and Rwanda. According to experts from Symantec, the Strider crew […]
The US-CERT warns of the presence of multiple flaws in the Nuuo NVRmini and other network video recorders of the same vendor. The US-CERT has issued a security advisory related to the presence of multiple vulnerabilities in the Web interface of a Netgear ReadyNAS Surveillance video recorder  and various devices manufactured by the video recording company […]
The experts from the Irish Garda are investigating a malware-based attack that forced it to shut down its data systems. No system was breached. The Garda SĂochĂĄna, the national police service of Ireland, was forced to shut down its data systems in response to a malware-based attack. The Ireland’s national police put in place the emergency […]
At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a computer through its monitor. It is a common error consider monitors as a passive device that could not be exploited by attackers to hack our systems. The reality is quite different, attackers could hijack every monitor […]