Chinese hackers brought down all major Afghanistan Government websites by hacking an official CDN network used in the country. The experts of the ThreatConnect Intelligence Research Team (TCIRT) recently reported the operation, dubbed Operation Helmand, run by a group of Chinese hackers that attacked the entire Afghan government web network. The hackers allegedly used a targeted cross-site scripting […]
Security experts involved in the investigation on the JPMorgan breach revealed that hackers exploited the lack of 2FA to compromise a server in the network. JPMorgan suffered months the biggest U.S. banking breach of all time, and now The New York Times provided more information on the case citing sources close to the experts involved in the […]
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers. Recently the experts at the Tor project issued a warning of a possible cyber attack against the Tor network through the seizure of the Directory authorities that can “incapacitate” the overall architecture. The experts […]
The Tor network could be seriously impacted by the seizure of directory authorities operated by law enforcement, despite it is a precious resource for all. The overall architecture of Tor network relies on nine directory authorities locate in the Europe and United States. The servers working as directory authorities provide a signed list of all the […]
USBdriveby is a device designed to quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB. The security experts Samy Kamkar (@SamyKamkar) has proposed a very interesting way to compromise an unlocked computer and deploy a backdoor on it simply by using a pre-programmed Teensy microcontroller. The cheap ($20) […]
Security researchers at Google have discovered several serious flaws affecting the NTP protocol, which are remotely exploitable by the attackers. Security experts at Google have uncovered several serious flaws in the Network Time Protocol (NTP), including several buffer overflows that are remotely exploitable. The Network Time Protocol is a networking protocol for clock synchronization between […]
German researchers have announced the discovery of news security flaws in SS7 protocol that could be exploited by an attacker to spy on private phone calls. A team of German researchers has discovered security flaws that be exploited by a threat actor to spy on private phone calls and intercept text messages on a large […]
The security expert Mohamed M.Fouad discovered several critical security vulnerabilities at Glassdoor, which can lead to very harmful impact on all users. The Independent Security Researcher Mohamed M.Fouad has discovered a lot of critical security vulnerabilities at Glassdoor that could lead to very harmful impact on all users. Mohamed M.Fouad an Independent Security Researcher from Egypt. I […]
More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability called Misfortune Cookie. More than 12 Million Home Routers are affected by a vulnerability called Misfortune Cookie that expose users to the risk of cyber attack. Researchers at Check Point Software Technologies reported the Misfortune Cookie flaw affects millions of devices running […]
The ICANN organization confirmed that several its systems were compromised via Spear Phishing attack. The company is investigating the case. ICANN revealed the details of a recent spear phishing attack that allowed unknowns to access its network. The attackers spoofed the ICANN domain, and deceived internal staff into revealing their email credentials. The ICANN is the organization […]