Experts at Symantec discovered that hackers quickly take advantage of CVE-2015-8562 remote code execution to compromise Joomla servers. Joomla recently patched the CVE-2015-8562 vulnerability that could be exploited by attackers for remote code execution. According to the security expert Daniel Cid from Sucuri, hundreds of attacks are now taking place. âWhat is very concerning is that this […]
Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]
Two German security experts have exposed a number of serious flaws in credit card payment systems that put users at risk. The duo of German security experts, Karsten Nohl  and Fabian Braunlein, found a new vulnerability in payment terminals that could be exploited by hackers to steal money. Differently from past attacks, this time, the hackers […]
The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the systemâs ,proximity. The collected […]
As a result of a configuration change a security issue allowed some Steam users to randomly see pages generated for other users for a period of less than an hour. Bad news for the popular community of Steam gamers, some of the users are facing serious security issues. Several users online reported to be able to […]
The Phantom Squad started the attacks on the PlayStation Network and the EA (Electronic Arts) as announced a few days ago. Last year hackers belonging to the hacking group of the Lizard Squad tool down at Christmas the online networks of both Microsoft Xbox Live and PlayStation network (PSN) highlighting security issues affecting the services of Sony […]
Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devices to spy on individuals. Lack of security by design and poor security settings could open the door to hackers. A Smartwatch or a fitness tracker […]
Security researchers from ESET uncovered the Roaming Tiger hacking campaign, bad actors in the wild are targeting Russian organizations. Roaming Tiger is the name of a cyber espionage campaign targeting high profile organizations in Russia and former Soviet Union countries, including Belarus, Kazakhstan, Kyrgyzstan, Tajikistan, Ukraine, and Uzbekistan. The Roaming Tiger campaign was discovered by experts at […]
A man from the Bahamas has been charged after allegedly hacking into the email accounts belonging to 130 celebrities stealing personal information, movie scripts and sex tapes. According to the U.S. Attorneyâs Office for the Southern District of New York , Alonzo Knowles, aka âJeff Moxey,â is a 23-year-old man suspected to have hacked into the email […]
A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the Juniper backdoor. Shortly after Juniper posted the advisory related to the presence of unauthorized code in the OS of some of its Firewalls, HD Moore, the developer of the Rapid7ⲠMetasploit Framework, revealed that approximately 26,000 […]