Hacking

Pierluigi Paganini March 09, 2017
Do you want your own IoT botnet? 185,000+ Wi-Fi-connected cameras are open to hack

The researcher Pierre Kim revealed that more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, ready to be hacked. According to the security advisory published by Pierre Kim via Full Disclosure, more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, a gift for crooks and hackers. The devices are affected by the following […]

Pierluigi Paganini March 09, 2017
Patch Apache Struts 2 Now! Hackers are exploiting a remote code execution zero-day in the wild

Researchers have spotted a remote code execution zero-day in Apache Struts 2, the flaw has being exploiting by that threat actors in the wild. Security researchers have spotted a remote code execution zero-day, tracked as CVE-2017-5638, in Apache Struts 2, and the bad news is that threat actors in the wild are already exploiting it. According to […]

Pierluigi Paganini March 08, 2017
Wikileaks Vault7: CIA Umbrage team, the factory of false flag ops

Wikileaks Vault7 data leak –  the Umbrage team was tasked by the Central Intelligence Agency for false flag hacking operations. WikiLeaks has obtained thousands of files allegedly originating from a CIA high-security network that details CIA hacking tools and capabilities.Digging in the huge trove of files, it is possible to find information about the ability of the […]

Pierluigi Paganini March 08, 2017
How to Browse The Internet Securely And Anonymously

These are some of the top methods you can use to browse the internet securely and anonymously. Even as the world becomes more aware of the imminent threat to our online privacy, few people understand the need to hide crucial information, such as IP addresses and private data streams, from entities such as our Internet […]

Pierluigi Paganini March 08, 2017
Dahua Video Recorders and Cameras affected by a serious flaw. Is it a backdoor?

The manufacture Dahua Technology has started releasing firmware updates fix a serious flaw in some models of its video recorders and IP cameras. Security experts believe the flaw is a true backdoor that could be used to remotely access the user database containing usernames and hashed passwords. The backdoor was discovered by a researcher that is known online as “bashis.” Once the attacker […]

Pierluigi Paganini March 08, 2017
Serious flaws in Western Digital My Cloud NAS devices allow attackers to fully control them

Researchers discovered serious issues in Western Digital My Cloud NAS that can be exploited by attackers to gain root control of the affected devices. Western Digital Corporation network-attached storage owners were warned of Critical flaws in Western Digital NAS boxes of the My Cloud NAS line could be exploited by remote attackers to gain remote control […]

Pierluigi Paganini March 07, 2017
WordPress 4.7.3 is out to fix 6 security issues, but CSRF flaw remains unpatched

WordPress 4.7.3 release is out to fix six security issues, but a CSRF vulnerability discovered in July 2016 remains unpatched. WordPress has issued a new security release, the WordPress 4.7.3 release, that addresses six security flaws, including three cross-site scripting (XSS) vulnerabilities.  The flaws were discovered by the security experts Chris Andrè Dale, Yorick Koster, Simon P. Briggs, Marc […]

Pierluigi Paganini March 07, 2017
Kaspersky Lab discovered a new sophisticated Shamoon-Linked malware dubbed StoneDrill

The experts spotted a new sophisticated strain of malware dubbed StoneDrill that is linked to Shamoon 2 and Charming Kitten. Researchers at Kaspersky Lab have discovered further information about the dreaded Shamoon 2 malware. The experts spotted a new sophisticated strain of malware dubbed StoneDrill that is linked to Shamoon 2 and Charming Kitten (aka Newscaster and […]

Pierluigi Paganini March 06, 2017
A bug in Twitter allowed hackers to access to locked accounts until October

A flaw in Twitter allowed attackers to access locked accounts bypassing the locking mechanism implemented by the company. A flaw in the Twitter application allowed, until a few months ago, to access locked accounts bypassing the locking mechanism implemented by the IT giant. Twitter can lock user accounts every time it believes the users are […]

Pierluigi Paganini March 05, 2017
A flaw in Slack app allowed hackers to take over a user account

A bug in the popular Slack application could be exploited by attackers to steal an access token and take over a user account. A serious flaw in the popular work chat application Slack could be exploited to take over a user account. The vulnerability was discovered by bug bounty hunter Frans Rosen who demonstrated that is possible […]