The code associated with Russian hacking operation dubbed Grizzly Steppe by the Obama administration infected a laptop at a Vermont utility. Russian hackers are again in the headlines because according to US officials, they hacked a Vermont utility, raising concerns about the security of the electrical grid of the country. Researchers discovered on a laptop a […]
A lot of new and exciting technology will emerge or become more prominent in 2017 and the following is just a glimpse of what is anticipated. IoT & Smart Home Tech Smart home technology had been in the works for years before finally getting off to a relatively slow start. But, now that large companies […]
Researchers at the security firm CheckPoint have discovered three fresh critical zero day vulnerability in the last PHP 7. Security researchers at the firm CheckPoint have discovered three fresh critical 0-day vulnerabilities in last PHP 7. These vulnerabilities allow an attacker to take full control over 80 percent of websites which run on the latest release […]
An executive order issued by President Obama applies sanctions on Russian military and intelligence officials. 35 Russian operatives were ejected. President Barack Obama issued an executive order to impose sanctions on a number of Russian military and intelligence officials in response to the alleged hacking campaigns against the 2016 US Presidential Election. The US ejected 35 Russian intelligence […]
Today I have the pleasure to interview @Firox_, one of the most intriguing characters of the hacking community. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. Well, unlike most hackers out there, I do not publicly participate in campaigns or operations under this […]
A security expert discovered a vulnerability in the MONyog tool that could be exploited by a normal user to elevate his privilege access. The security researcher and penetration tester Mutail Mohamed (@muleyl) discovered a vulnerability in the MONyog, the most secure and scalable MySQL monitoring tool of the server monitoring tool. The application URL is https://www.webyog.com/product/monyog and the affected version is MONyog […]
The company InterContinental Hotels Group (IHG) confirmed an ongoing investigation of alleged card breach at some of its properties. The notorious investigators Brian Krebs was informed of a possible security breach at the hotel company InterContinental Hotels Group (IHG). Krebs received the news of the alleged card breach by his sources in the financial industry. According […]
Security experts from Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers in order to change their DNS settings. Malware researchers at Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers and changes their DNS settings in order to redirect traffic to malicious websites. The Switcher Trojan has been […]
According to the firm SecuriTeam, several ZyXEL customized routers are affected by many vulnerabilities that could be easily exploited by hackers. According to the firm SecuriTeam, multiple ZyXEL customized routers are affected by many vulnerabilities. The devices are distributed by the Thai IPS TrueOnline. The ZyXEL customized routers are offered for free to the customers with default settings, including default accounts […]
Let’s speak with PhantomSquad, one of the most active groups of hackers that was involved in recent attacks against the gaming industry. You are a talented hacker that is very active online, could you tell me more about you. Could you tell me which his your technical background and when you started hacking? I was beginning […]