exploit

Pierluigi Paganini September 05, 2016
NSA EXTRABACON exploit still threatens tens of thousands of CISCO ASA boxes

Two security experts from the Rapid 7 firm revealed that tens of thousands of CISCO ASA boxes are still vulnerable to the NSA EXTRABACON exploit. A few weeks ago the Shadow Brokers hacker group hacked into the arsenal of the NSA-Linked Equation Group leaked online data dumps containing its exploits. ExtraBacon is one of the exploits […]

Pierluigi Paganini August 24, 2016
The Equation Group’s exploit ExtraBacon works on newer Cisco ASA

Security experts have improved the ExtraBacon exploit included in the NSA Equation Group arsenal to hack newer version of CISCO ASA appliance. The data dump leaked online by ShadowBrokers is a treasure for security experts and hackers that are analyzing every tool it contains. Cisco and Fortinet have confirmed their network appliance are vulnerable to the exploits […]

Pierluigi Paganini August 10, 2016
Exodus announces a bug bounty program. Who will pay more for a zero-day?

The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on the zero-day market. Almost every IT giant has launched its bug bounty program, the last in order of time is Apple that last week announced the initiative during the Black Hat Conference. How much is […]

Pierluigi Paganini August 09, 2016
Automated systems crawl the DarkWeb to find Zero-Days

A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence Can finding zero-day vulnerabilities be as easy as crawling the Darkweb? Security researchers at Arizona State University (ASU) think so and they’re already seeing some success.  In a paper titled, “Darknet and Deepnet Mining for […]

Pierluigi Paganini June 23, 2016
Godless, the Android Malware that employs multiple rooting exploits

Godless is a new strain of Android Malware recently spotted by experts from Trend Micro that leverages multiple rooting exploits. Godless is a new strain of malware that uses multiple rooting exploit to compromise Android mobile devices. The mobile malware is a sort of hacking platform that includes an open-source rooting framework called android-rooting-tools. The […]

Pierluigi Paganini March 22, 2016
Google issued an emergency patch for critical CVE-2015-1805 flaw

Google released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting its OS. Google has released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting the kernel of the Android OS of certain devices. The vulnerability is ranked as critical and can be exploited by rooting applications […]

Pierluigi Paganini December 07, 2015
3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC are affected by serious flaws. Security Researcher slipstream/RoL posted Proof-of-concept exploits online (3 OEMs Vulnerable To Three Vulnerability Your PCs At Risk) demonstrating how to compromise machines available on the market. Three OEMs. Three applications preinstalled. Three exploits. […]

Pierluigi Paganini November 03, 2015
Hackers win $1 million bounty for iOS 9 remote hack

A team of hackers has received a million-dollar payout for disclosing a iOS zero-day vulnerability that could allow an attacker to remotely hack any Phone. Bad news for the Apple users, a team of hackers have received a million-dollar payout for disclosing an iOS zero-day vulnerability that could allow an attacker to remotely hack any Phone […]

Pierluigi Paganini October 13, 2015
NSA SHARKSEER program aims to detect and mitigate malware Zero-Day

The NSA SHARKSEER Program is a project that aims to detect and mitigate web-based malware Zero-Day and Advanced Persistent Threats using COTS technology. Every day, thousands of cyber attack rely on exploitation of zero-day exploits, even more sophisticated ATP groups trigger unknown vulnerabilities to compromise systems across the world. Intelligence agencies and research groups are investing […]

Pierluigi Paganini September 22, 2015
Adobe fixes dozens critical vulnerabilities in Flash Player

Adobe has released a new Flash Player update that patches 23 critical vulnerabilities in the popular software. Update your version asap. Adobe has released a new Flash Player update that fixes 23 critical vulnerabilities in the popular software. According to the security bulletin issued by Adobe, Version 18.0.0.231 and earlier of the Flash Player for Windows and […]