Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm HackingTeam has suffered. In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was […]
A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against servers. A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks against server performing thousands of authentication requests remotely. The vulnerability affects the latest version […]
Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid RAT, one of the most professionally developed and sophisticated malware. Since the leak of Hacking Team hack, every day in security area have been inundated with news about some vulnerability, exploit, etc. etc., and still more news are yet to come out. […]
What will happen if hackers will hit critical infrastructure in the US, which will be the economic impact of a cyber attack against a power grid? According to a poll done by Morning Consult firm, cyber attacks are just behind terrorism attacks on the list of biggest threats to the US, it has been estimated that the […]
Thi post was written by the security experts and colleagues at RedSocks, they explored the argument of the “Attribution” for the Hacking Team data Breach. Attribution is probably one of the toughest things to deal with during a major Cyber Security breach, yet it is one of the most demanded skills.Earlier in the first incident […]
The Outpost24 team has identified several vulnerabilities that affect Joomla HelpDesk Pro extension, the flaws can lead to remote code execution on servers. Kasper Bertelsen, a security researcher at Outpost24 has discovered a number of vulnerabilities in the Joomla Helpdesk Pro extension which can lead to remote code execution on servers. The Helpdesk Pro Joomla extension is developed […]
Facebook releases query packs for finding possible malware infection, including the malicious exploits used by the Hacking Team to hack Mac OS X. The Hacking Team hack revealed to the IT industry the “weapons” used by the Italian firm to compromise practically every system. Security experts who analyzed the material leaked online discovered the exploits […]
The popular hackers Charlie Miller and Chris Valasek have demonstrated how to hack a connected car remotely. Charlie Miller and Chris Valasek do not need any introduction, they are two stars of the hacking community that have alerted several times automotive industry regarding the risks related to the hack of connected cars. To demonstrate the feasibility […]
MongoDB administrators have exposed something like 595.2 terabytes of data by using bad poor configurations, or un-patched versions of the MongoDB. John Matherly, the creator of Shodan, the marvelous search engine for connected devices, revealed that many MongoDB administrators have exposed something like 595.2 terabytes of data by using bad poor configurations, or un-patched versions […]
According to the security experts at FireEye, Microsoft releases out-of-band patch for all Windows version after Hacking Team hack. Microsoft released an out-of-band patch to fix a critical security issue in the Windows Adobe Type Manager Library that could be exploited by attackers to execute arbitrary code remotely on the targeted machine. The exploitation of […]