Hacking

Pierluigi Paganini August 18, 2016
Operation Ghoul targeted more than 130 organizations in 30 countries

Kaspersky Lab discovered the Operation Ghoul, a campaign targeting industrial, manufacturing and engineering organizations in more than 30 countries. Security experts from Kaspersky have discovered a profit-driven campaign dubbed Operation Ghoul. Threat actors behind the Operation Ghoul targeted more than 130 organizations in 30 countries, including companies operating in the industrial and engineering sectors. Hackers targeted mainly […]

Pierluigi Paganini August 18, 2016
Cisco, Fortinet issue fixes against Equation Group exploits

Customers of Cisco and Fortinet security firms need to patch their products to fix the flaws exploited by the Equation Group exploits and hacking tools. While security experts are analyzing the hacking tools leaked in the data dump by the Shadow Brokers, security firms are working to fix the vulnerabilities exploited by the Equation Group toolsets. Both […]

Pierluigi Paganini August 18, 2016
A close look at the exploits leaked after the Equation Group hack

The NSA-linked unit The Equation Group has been hacked and a data dump containing exploits and tools has been leaked online. Is it legitimate? It is the topic of the moment, the group The Shadow Brokers has hacked the NSA-linked unit the Equation Group and leaked online exploits and hacking tools. The hackers had dumped online […]

Pierluigi Paganini August 17, 2016
Hacker Interviews – VujāDĂ©GhÖƛt (@VujaDeGhost)

Are you searching for a cyber security expert that attacks ISIS online propaganda every day? VujaDeGhost is one of them. Enjoy the interview! Have you participated in any hacking campaigns? I have not personally participated in the hacks that have been in the news or have been plastered all over Twitter as of late. That being said, I […]

Pierluigi Paganini August 17, 2016
CVE-2016-569 Linux flaw leaves 1.4 billion Android devices vulnerable to hack

Experts from Lookout revealed that all Android versions running the Linux Kernel 3.6 to the latest are affected by the CVE-2016-569 Linux flaw. Recently I wrote about a severe vulnerability (CVE-2016-5696) affecting the Linux version 3.6, deployed in 2012. The flaw was discovered by researchers from the University of California, Riverside, and the U.S. Army […]

Pierluigi Paganini August 16, 2016
The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]

Pierluigi Paganini August 16, 2016
Hacker Interviews – DĂȘfĂŁult VĂ­rĂŒsa (@_d3f4ult)

Dear Readers, today I want to present you DĂȘfĂŁult VĂ­rĂŒsa one of the most intriguing hackers on the Internet. He is the Admin of #AnonSec & @L0sExtraditable hacker groups Enjoy the Interview. You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about. Our page on EncyclopediaDramatica should […]

Pierluigi Paganini August 15, 2016
DDoSCoin, the cryptocurrency that pays the participation in DDoS attacks

Two researchers have devised a cryptocurrency scheme dubbed DDoSCoin that pays everytime a user participates in a DDoS attack against certain servers. The assistant professor at the University of Colorado Eric Wustrow and the phD student at the University of Michigan Benjamin VanderSloot have conducted a curious proof-of-concept project aimed at the creation of a cryptocurrency that […]

Pierluigi Paganini August 14, 2016
DEF CON 2016 – Bluetooth-based smart locks easy to hack

Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last week security researchers Ben Ramsey and Anthony Rose of Merculite Security demonstrated at the Def Con conference how it is easy to open some Bluetooth-based smart locks. The duo analyzed 16 smart locks from companies […]

Pierluigi Paganini August 13, 2016
Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi’s sensitive data. The hack to the US Presidential election is becoming even more mysterious, while security experts are blaming the Russia for the cyber espionage, a strange figure claims the responsibility for the security breach. […]