Recent revelations have made it clear that SS7 breaches can occur, thanks to the vulnerabilities of such a set of protocols for telecom. Hackers can take advantage of these threats, like they have done in the past, as German researchers warn. The example of Ukraine and Russia highlights the danger crawling towards countries wishing to […]
Hackers have now got the knowledge and ability to track down dashboard technology and intercept crucial info from cars and especially luxury ones. It has been reported that cars wit fitted wireless technology can be hacked by experts and cause grave problems to their owners. Hackers have now got the knowledge and ability to track […]
USBdriveby is a device designed to quickly and covertly install a backdoor and override DNS settings on an unlocked machine via USB. The security experts Samy Kamkar (@SamyKamkar) has proposed a very interesting way to compromise an unlocked computer and deploy a backdoor on it simply by using a pre-programmed Teensy microcontroller. The cheap ($20) […]
German researchers have announced the discovery of news security flaws in SS7 protocol that could be exploited by an attacker to spy on private phone calls. A team of German researchers has discovered security flaws that be exploited by a threat actor to spy on private phone calls and intercept text messages on a large […]
The security expert  Mohamed M.Fouad discovered several critical security vulnerabilities at Glassdoor, which can lead to very harmful impact on all users. The Independent Security Researcher Mohamed M.Fouad has discovered a lot of critical security vulnerabilities at Glassdoor that could lead to very harmful impact on all users.  Mohamed M.Fouad an Independent Security Researcher from Egypt. I […]
More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability called Misfortune Cookie. More than  12 Million Home Routers are affected by a vulnerability called Misfortune Cookie that expose users to the risk of cyber attack. Researchers at Check Point Software Technologies reported the Misfortune Cookie flaw affects millions of devices running […]
This is a sad day for me, my friend and colleague Martin Dipo Zimmermann is passed away after suffering an heart-attack. Martin was the Chief Technical Officer and co-founder of the Cyber Threat Intelligence Network, I was working with him and other colleagues to threat intelligence activities. Martin was the Chief Technical Officer and co-founder of the […]
Vespid is amongst most the important espionage artifacts based on the Wireless Aerial Surveillance Platform for the for the construction of a DIY Spy Drone. The Wireless Aerial Surveillance Platform is a small DIY drone that has the capability to crack Wi-Fi passwords, eavesdropping on Wi-Fi passwords, eavesdropping on cell phone calls and read text […]
Sony Pictures is adopting various measures to contains damages including a “fighting back” activity against website that share the stolen data. We will talk about the Sony Pictures data breach for a long time, the cyber attacks conducted by the GOP hacking team is causing serious damages to the company. It is early to estimate the overall economic impact […]
Security experts at Sans Institute discovered a worm which exploits the popular Shellshock flaw to compromise QNAP systems in the wild. Experts at Sans Institute have discovered a new series of attacks in the wild exploiting the Shellshock attack code to compromise disk storage systems made by the Taiwan-based QNAP firm. The threat actors used […]