The Israeli law enforcement arrested two youngsters suspected of operating the infamous vDoS booter. Israeli authorities have arrested two alleged operators of a DDoS service, named vDOS, as the result of an investigation conducted by the FBI. The popular security investigator Brian Krebs reported that the duo behind the vDOS booter service had earned more than $600,000 […]
Today I have the pleasure to share with you the interview with Francisco Francisco J. Rodriguez. He is a member of the Spanish Cyber Security Institute, Cybersecurity and Cybercrime Research and collaborating with State security forces. His twitter @0fjrm0 and his talk about Real Time Cyberattacks at https://goo.gl/ge6G9i You are one of the world’s most talented […]
A security researcher disclosed a critical MySQL zero-day affecting all the default configuration of all MySQL versions including 5.5, 5.6 and 5.7. The security researcher Dawid Golunski has disclosed a critical zero-day vulnerability affecting the popular database management system (RDBMS) MySQL. The researcher decided to disclose the critical flaw because Oracle failed to release a […]
Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software. Recently, the iPhone hack carried out with the NSO Group‘s Pegasus raised the debate about the use of surveillance software. Who uses them? How? Are we able to defend our machines from a so invasive surveillance? NSO Group is […]
The Payment Card Industry Security Standards Council (PCI Council) updates its standard to reduce fraudulent activities against PoS systems. The number of credit card frauds involving Point-of-Sale continues to increase, in the last months, numerous attacks targeted retails and hotels worldwide. The Payment Card Industry Security Standards Council (PCI Council) has responded with the definition […]
Every collective has its tactics and tools, Today I’ll present you Anonandmore, a hacker that is very active online. Enjoy the Interview. You are a talented hacker that is very active online, could you tell me more about you. Could you tell me which his your technical background and when you started hacking? I started […]
The researcher MalwareMustDie discovered LuaBot, a trojan completely coded in Lua language that is targeting Linux platforms to recruit them in DDoS botnet. Let’s continue our tour in Linux security, focusing on malicious code specifically designed to target such systems. The popular security researcher MalwareMustDie, who recently reported the new ELF trojan backdoorLinux/Mirai, also discovered a […]
Cisco disclosed the existence of the CVE-2016-6399 flaw that can be exploited by remote unauthenticated attackers to trigger DoS conditions in ACE products. Experts at Cisco have disclosed the existence of a high-severity vulnerability, tracked as CVE-2016-6399, that can be exploited by remote unauthenticated attackers to trigger DoS conditions in some of Application Control Engine (ACE) […]
Today I have the pleasure to share with you the interview with Francisco Moraga, a popular cyber security expert also known as @BTshell . Enjoy it! You are one of the most respected experts on cyber security. Could you tell me which his your technical background and when you started hacking? My name is Francisco Moraga, […]
Another old and huge data breach was reported to LeakedSource, more than 33 million QIP records from 2011 have been compromised. Once again we are here to discuss a data breach, the victim is the Russian instant messaging service Quiet Internet Pager (QIP.ru.). According to the breach notification service LeakedSource, the leaked dump includes details of […]