A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and Georgetown University has devised a method for hacking mobile devices by using hidden voice commands embedded in YouTube videos. In order to hack […]
Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of s1ege. s1ege is a member of the Ghost Squad and was one of earlier components of the AnonGhost hacker collective. The split occurred as Mauritania Attacker and few others of AnonGhost joined ISIS. Enjoy the interview […]
Threat actors in the wild are behind the Realstatistics campaign are leveraging on out-of-date CMSs to deliver the CryptXXX ransomware. Security experts from Sucuri security firm have spotted a new ransomware-based campaign dubbed ‘Realstatistics’ conducted by threat actors in the past two weeks. “Our Incident Response Team (IRT) has been tracking a mass infection campaign over the […]
The hacker behind the Twitter account 0x2Taylor is claiming to have breached one of the Amazon servers containing 80,000 login credentials of Kindle users. The hacker 0x2Taylor is claiming to have breached an Amazon server containing login credentials of Kindle users. As a proof the hack, the hacker leaked online more than 80,000 credentials belonging to Amazon […]
Security experts from ProofPoint have spotted a new campaign operated by the APT Group NetTraveler that is targeting Russian and European organizations. NetTraveler is an ATP group first spotted by Kaspersky in 2013, when researchers discovered an espionage activity against over 350 high profile victims from 40 countries. The name of the operation derives from the malicious […]
The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data exposed in more than 1000 stores. The hack suffered by Wendy’s fast-food chain was bigger than thought and exposed sensitive information, including credit card data. Roughly one on three Wendy’s burger was hacked, a malware has infected PoS systems. Just after the […]
A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack. Once again IoT devices are affected by a serious flaw that could be exploited by hackers to compromise them, this time we speak of Car Hacking. Almost any modern connected vehicle uses a drive-by-wire system that […]
A vulnerability in the firmware running on many D-Link products allows attackers to take over cameras and other 120 products. A month ago, the Senrio research team discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera. The vulnerability allows code injection which lets the attackers […]
Chinese Ad company Yingmob ’s developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad company Yingmob’s developers are allegedly responsible for the infection of approximately 10 million Android devices which is reportedly generating an income of around $300,000 USD per month. CheckPoint, the security company famous for their network […]
The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway that exposes army data. The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway, an application only for the staff use, that could be exploited by attackers to gain access to the […]