Researchers at Palo Alto Networks have come across a new threat used by alleged Iran-linked Hackers in attacks since 2007. Security experts at Palo Alto Networks discovered a new malware, named Infy, that has been likely used by hackers from Iran in cyber espionage operations at least since 2007. The researchers discovered the Infy malware […]
Security researchers have discovered multiple flaws in the Samsung Smart Home automation system that could be exploited by remote attackers. Security researchers from the University of Michigan have discovered multiple flaws affecting the Samsung Smart Home automation system that could be exploited by remote attackers for several attacks, including making keys for connecting front door locks. […]
A serious expert discovered a flaw in PwnedList service that could have been exploited to access millions of account credentials managed by the service. A serious vulnerability found in the PwnedList could have been exploited by hackers to gain access to millions of account credentials collected by the service. The service PwnedList allow users to check if […]
Doubts about a couple of draft anti car hacking laws, they could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity of connected components that could be easily compromised knowing the communication protocol used by principal vendors. The interest in car hacking gained […]
Watch now and learn to Bypass Modern WAF’s Exemplified at XSS in another Series of Garage4hackers Ranchoddas Webcast. Garage4hackers presents Ranchoddas Webcast Series on Bypassing Modern WAF’s Exemplified At XSS by Rafay Baloch Let me explain you how will you be benefited productively by watching this video. The speaker will start at a very beginner […]
The CESG is considered the Information Security Arm of GCHQ, it has disclosed more than 20 vulnerabilities affecting multiple software this year. The British intelligence agency GCHQ has disclosed more than 20 vulnerabilities affecting multiple software. The information was shared by a GCHQ spokesperson with the Motherboard. The flaws were discovered by the CESG (Communications-Electronics Security Group), which […]
An interview with Pete Herzog, the co-founder and Managing Director of ISECOM, about the Hacker Highschool (HHS) initiative. Today’s teens are in a world with major communication and productivity channels open to them and they don’t have the knowledge to defend themselves against the fraud, identity theft, privacy leaks and other attacks made against them […]
The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group. In the last days of April, Flashpoint a global leader in Deep and Dark Web data and intelligence published a report that is dedicated to the analysis of cyber capabilities of the ISIS with the […]
Microsoft issued a detailed report on the activity of the hacking crew dubbed Platinum APT group that leveraged a Windows patching system in its attacks. The hacker crew discovered by Microsoft and dubbed Platinum APT group conducted cyber espionage against organizations in South and Southeast Asia leveraging a Windows patching system. According to Microsoft, the Platinum has […]
Pro-ISIS hackers belonging to the United Cyber Caliphate issue a kill list that includes dozens of U.S. government personnel. A few days ago, the US Government announced the first attack conducted by the Cyber Command against members of the ISIS online. The US Cyber Command will run hacking operations and use cyber weapons to destroy computer […]