Security vulnerabilities in the vBulletin platform have exposed more than 27 million accounts, many of them belonging to gamers on mail.ru. The Data breach monitoring service LeakedSource has disclosed 11 new data breaches. Security vulnerabilities in the vBulletin platform have exposed more than 27 million accounts, the majority of which belongs to three games on […]
Thailand – A gang of foreign criminals stole millions of baht by hacking ATMs in the country. The gang is linked the one that hacked ATMs in Taiwan. Hackers belonging to a cybercrime gang from Eastern Europe have stolen over 12 Million Baht (approximately US$346,000) from a 21 ATMs in Thailand. The crooks have targeted […]
Security experts have improved the ExtraBacon exploit included in the NSA Equation Group arsenal to hack newer version of CISCO ASA appliance. The data dump leaked online by ShadowBrokers is a treasure for security experts and hackers that are analyzing every tool it contains. Cisco and Fortinet have confirmed their network appliance are vulnerable to the exploits […]
The Navis WebAccess application used in the transportation sector worldwide is affected by a high severity SQL injection vulnerability. A software used in the US ports is affected by a high severity SQL Injection vulnerability (CVE-2016-5817). The flaw was discovered by a hacker behind the online moniker âbRpsd,â the expert has discovered the vulnerability in […]
Today I have interviewed Mr C, aka @NotCracka another interesting figure of the hacking community. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? The unique technical background I have is related my participation to the Anonops IRC where people teach me about advanced web attacks, including the […]
IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I love some of the gangster nicknames people come up with. Knuckles, Fat Tony , Stab Happy or even Bambi. Names are characteristic of their personality and attitude. Itâs time to add Toaster Socket to the […]
The Epic Games forums hacked again, more than 800,000 logins accounts have been stolen, with more than half a million from Unreal Engine’s forums. Epic Games forums breached again, salted passwords of 808,000 Unreal Engine and Unreal Tournament forum accounts have been exposed. The stolen records from Epic Games include email addresses, birth dates, and […]
A security expert analyzed a BHU Wi-Fi router and found that it is easy to hack by an unauthenticated attacker that can access sensitive information. Tao Sauvage, an expert from IOActive, has analyzed a BHU Wi-Fi router that he purchased during a travel. The BHU Wi-Fi router appears like a surveillance box, but according to the […]
A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models made from Facebook photos. Facial recognition systems still have a certain margin of error, for example, trying to identify people of color. A group of researchers from the University of North Carolina demonstrated that a number […]
A security expert noticed strange transactions from the Bitcoin wallet of the SilkRoad (now in the hands of Feds) to the ShadowBrokers ‘ wallet. I was surfing the Internet searching for interesting data about the ShadowBrokers group that leaked exploits and hacking tools belonging to the NSA Equation Group. I have found a very intriguing analysis […]