Cybercriminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve malware. DNS impairment or rather compromising DNS to distribute malicious code, cyber criminals are very attracted by the possibility to use DNS servers to redirect users that trying to visit a legitimate domain are hijacked […]
The Security researcher Dan Melamed has found two new Facebook vulnerabilities related to the Fanpage Invite of the popular social network. Security researcher Dan Melamed has found 2 new Facebook vulnerabilities that has been recently patched and that I decided to shows you to understand the infinite possibilities an attacker have to hit also a robust platform […]
Security Researcher Mohamed Osman Saeed has found a long series of critical vulnerabilities in major websites but he could not participate to any bounty program because he lives in the sanction country ÂSudan. Security Researcher Mohamed Osman Saeed has found a long series of vulnerabilities in major websites. He declared to have found an XSS flaw in 2 IBM Site’s ( […]
Chinese Hacking Team Comment Crew caught taking over a honeypot simulating a Water Plant, the infinite offensive of Chinese Cyber Units linked to PLA. The Comment Crew group of hackers has been identified during an attack to a fake US control system of a water facility. The researchers deployed a honeypot to collect evidences on the attackers that […]
This POC demonstrates that exploiting a Facebook flaw it is possible the disclosure of Friends List EVEN WHEN HE HAS BLOCKED ACCESS TO VIEW IT This is a Proof of Concept made by BHAVESH NAIK DO YOU WISH TO SEE WHO IS IN YOUR FRIENDS LIST, EVEN WHEN YOUR FRIEND HAS BLOCKED ACCESS TO VIEW HIS […]
The HTTPS cryptographic scheme is menaced by the BREACH attack that allows hackers to capture security credentials, email addresses and much more from encrypted pages, often in as little as 30 seconds. Breach (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is the name of an new methods to capture login tokens, session ID […]
At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic Army (SEA). White House employees personal email hacked, it is happened to three staffers that suffered data breaches on their personal Gmail accounts. The source of intelligence revealed a link between this attack and the […]
Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to remotely access to the computers. Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities. Lenovo PC banned by spy agencies in the UK, Australia and the US due the possible impairment […]
Media agencies reported news of a cyber attack against the Istanbul Ataturk International Airport, the passport control system at the departure terminal was hit causing many problems at the airport. The Turkish authorities diffused the news of a cyber attack against the Istanbul Ataturk International Airport. Official sources revealed that the passport control system at the […]
A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the GPS expert Todd Humphreys demonstrated it. A GPS vulnerability could allow hackers and terrorists to hijack ships, drones and commercial airliners, the news represents a motivation of the greatest concerns for responsible for the national security of every country. […]