Hacking

Pierluigi Paganini April 09, 2015
FBI warns of attacks against WordPress-based sites run by ISIS sympathizers

The FBI is warning that individuals sympathetic to the ISIS are running mass-hacking websites exploiting known vulnerabilities in WordPress. The FBI is warning administrators of WordPress websites about the possibility of cyber attacks carried out by sympathizers of the ISIS  terrorist group. Unfortunately, it is quite simple to compromise websites based on the popular content management system (CMS) that […]

Pierluigi Paganini April 08, 2015
Snowden keeps saying that US is still catching our emails

The British television host scored a rare one-on-one interview in Moscow with Edward Snowden for the Sunday’s edition of the “John Oliver Tonight” show. A British channel hosted a rare interview with Snowden in Moscow, the interview was conducted by John Oliver from “John Oliver Tonight.” Aside from jokes like “Do you miss a hot […]

Pierluigi Paganini April 08, 2015
How Russians hackers breached the White House unclassified network

According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]

Pierluigi Paganini April 07, 2015
Flaw in WP-Super-Cache plugin threatens million of WordPress websites

Million of WordPress websites are vulnerable to cyber attacks due to a critical vulnerability affecting the WP-Super-Cache plugin. Million of WordPress websites using the WP-Super-Cache are exposed to the risk of cyber attack due to a critical vulnerability affecting the popular plugin. The WP-Super-Cache plugin, is normally used to improve the performance of the WordPress website because it generates static HTML […]

Pierluigi Paganini April 07, 2015
A severe arbitrary code execution in BitTorrent Sync affects various products

A security expert has discovered a severe vulnerability in BitTorrent Sync that can be exploited by a remote attacker to execute arbitrary code on a vulnerable machine. The security expert Andrea Micalizzi, also known as “rgod,”, has discovered a serious vulnerability in BitTorrent Sync (CVE-2015-2846) can be exploited by a remote attacker to execute arbitrary code. […]

Pierluigi Paganini April 07, 2015
Data Breach – Hackers violated a server at Linux Australia

The organization Linux Australia revealed that one of its servers was hacked. The personal data of conference attendees might have been exposed. Linux Australia revealed a data breach occurred on March 22, according to the organization attackers may have accessed personal details of conference attendees. Linux Australia is an organization that represents nearly 5,000 Australian users […]

Pierluigi Paganini April 06, 2015
Another phishing scam is targeting Yahoo users

A new phishing scam is targeting Yahoo users worldwide, this campaign could be ineffective if we share awareness about bad actors’ TTPs. A new large-scale scam is trying to deceive Yahoo users that are receiving a phishing email that asks for “Yahoo Account Confirmation.” The phishing email claims to be sent by Yahoo, it requests […]

Pierluigi Paganini April 04, 2015
Bugs in Tor exploited to run DoS against black markets

A severe vulnerability  in Tor network was exploited by attackers to run denial of service attacks against two underground black markets. An operator of an underground black market hosted on the Tor network revealed that hit site suffered a DoS attack that exploited a flaw in Tor architecture. The event is not isolated, a similar […]

Pierluigi Paganini April 02, 2015
Obama signed an executive order as deterrent against hacking

A new executive order signed by the US President Obama imposes sanctions against every entities that is threatening US assets, even overseas hackers The President of United States, Barack Obama has signed an executive order that uses economic restrictions to “control” anyone that is trying to attack any American interests. But what this exactly means? […]

Pierluigi Paganini April 02, 2015
mDNS can be abused to amplify the traffic of DDoS attack

A security researcher discovered that the improper configuration of some multicast DNS (mDNS) implementations could be used to amplify DDoS attacks. The multicast Domain Name System, also known as mDNS,  is a multiplatform service designed to resolve host names to IP addresses within small networks that doesn’t have a local name server. The mDNS can work in a […]