During the weekend, nearly 590,000 Comcast email addresses and passwords were offered for sale on a BlackMarket in the dark web. It is now the turn of Comcast, over the weekend nearly 590,000 Comcast email addresses and passwords were offered for sale on a BlackMarket in the dark web. As proof of the authenticity of the […]
Experts from Check Point firm published a new report on the Rocket Kitten APT that include more insight into the activities of the group. Do you remember the Rocket Kitten ATP? The Rocket Kitten group has been suspected to be active since 2011 and have been increasing their activity since 2014. The main targets are based in the Middle […]
Kaspersky Lab issued a report that warns users of the possible risks when facing with connected coffee machines and other wireless-enabled home devices. The paradigm of the Internet of Things has dramatically enlarged our surface of attack, smart devices surrounding us are a privileged target for cyber criminals. What about your coffee machine? The coffee machines could become […]
What are black swans? In defence, a black swan is a way someone has passed all your defences, although you thought you covered all the attacking vectors. A black swan is an incident that you didn’t participate. It’s a sign for the irrational way of human thinking. When you see only white swans, you don’t […]
Documents published by the UK Government reveal that the UK’s National Crime Agency has the hacking capabilities, so called equipment interference. We have debated for a long time about hacking capabilities of principal law enforcement and intelligence agencies. Many documents leaked by the whistleblower Edward Snowden revealed that the UK intelligence agency, the GCHQ has the […]
The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool was created to help the auditors and penetration testers […]
The ISIS group known as the Cyber Caliphate hacked 54,000 Twitter accounts and leaked online data of heads of the CIA and FBI. We have discussed several times about the cyber capabilities of the ISIS sympathizers, recently Mikko Hyppönen, Chief Research Officer for F-Secure, said he worries about cyber extremists that could penetrate critical infrastructure and cause […]
On 4th November 2015, Touchnote company received information confirming that is has been the victim of a data breach that exposed customer data. Data breaches are becoming a daily event, the last one in the headlines it the hack suffered by the Touchnote postcard app. Hackers have stolen customer data from Touchnote database, the popular app that […]
PageFair, the anti-ad blocking analytics service used by The Economist’s was hacked on Halloween and the attackers used it to serve malware. On Halloween, hackers have compromised the anti-ad blocking service PageFair used by The Economist exposing readers to malware infections. PageFair allows publishers to measure how many visitors block their ads, users who visited The […]
Cracka hackers who took over the personal email account of CIA Director John Brennan have now doxed more than 2000 Government employees. The young hackers of the crew known as Crackas With Attitude (CWA) announced that they have doxed more than 2,000 Government employees. The hackers are the same that accessed into the AOL email account of the […]