Hacking

Garage4hackers – An open Information Security Community. w00t! w00t!

Who are we? Garage4hackers is one of the oldest open information security community for Information Security enthusiast and aspirants on…

9 years ago

Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

Blue Coat spotted a new ransomware-based campaign serving the Dogspectus malware. Crooks combined a Hacking Team exploit and the Towelroot…

9 years ago

Bogus social button plugin redirects to Angler Exploit Kit

Experts at Malwarebytes observed a new attack pattern that relies on fake social button plugin that redirects visitors to Angler…

9 years ago

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the…

9 years ago

Snap packaging could reveal private data in Ubuntu 16.04 version

A feature in the Ubuntu 16.04 version could be abused to expose users private data posing a serious threat to…

9 years ago

Software Reverse Engineering Process: Basics and Some Explanations

Software reverse engineering is frequently mentioned in several contexts, including many illegal activities. What does it mean? Software reverse engineering…

9 years ago

Microsoft Windows Applocker circumvented by exploiting native OS utility to remote execute code

The native Windows command-line utility Regsvr32 can be exploited to bypass MS Applocker and run remote code bypassing protection mechanisms.…

9 years ago

Facebook hacked, someone deployed a malicious webshell on its server

Facebook hacked!  The security expert Orange Tsai discovered the presence of a malicious webshell on one of the company servers.…

9 years ago

FBI paid more than $1.3 million to hack into San Bernardino shooter iPhone

FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to…

9 years ago

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

9 years ago

This website uses cookies.