A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum the stolen data. A Ukrainian hacker going by the pseudonym of Pravy Sektor has hacked the servers of Polandâs telecom company Netia SA, the second largest telecom company in the country. The hackers stole personal details […]
A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and Georgetown University has devised a method for hacking mobile devices by using hidden voice commands embedded in YouTube videos. In order to hack […]
Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of s1ege. s1ege is a member of the Ghost Squad and was one of earlier components of the AnonGhost hacker collective. The split occurred as Mauritania Attacker and few others of AnonGhost joined ISIS. Enjoy the interview […]
Threat actors in the wild are behind the Realstatistics campaign are leveraging on out-of-date CMSs to deliver the CryptXXX ransomware. Security experts from Sucuri security firm have spotted a new ransomware-based campaign dubbed ‘Realstatistics’ conducted by threat actors in the past two weeks. “Our Incident Response Team (IRT) has been tracking a mass infection campaign over the […]
The hacker behind the Twitter account 0x2Taylor is claiming to have breached one of the Amazon servers containing 80,000 login credentials of Kindle users. The hacker 0x2Taylor is claiming to have breached an Amazon server containing login credentials of Kindle users. As a proof the hack, the hacker leaked online more than 80,000 credentials belonging to Amazon […]
Security experts from ProofPoint have spotted a new campaign operated by the APT Group NetTraveler that is targeting Russian and European organizations. NetTraveler is an ATP group first spotted by Kaspersky in 2013, when researchers discovered an espionage activity against over 350 high profile victims from 40 countries. The name of the operation derives from the malicious […]
The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data exposed in more than 1000 stores. The hack suffered by Wendy’s fast-food chain was bigger than thought and exposed sensitive information, including credit card data. Roughly one on three Wendy’s burger was hacked, a malware has infected PoS systems. Just after the […]
A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack. Once again IoT devices are affected by a serious flaw that could be exploited by hackers to compromise them, this time we speak of Car Hacking. Almost any modern connected vehicle uses a drive-by-wire system that […]
A vulnerability in the firmware running on many D-Link products allows attackers to take over cameras and other 120 products. A month ago, the Senrio research team discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera. The vulnerability allows code injection which lets the attackers […]
Chinese Ad company Yingmob âs developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad company Yingmobâs developers are allegedly responsible for the infection of approximately 10 million Android devices which is reportedly generating an income of around $300,000 USD per month. CheckPoint, the security company famous for their network […]