FireEye published a report titled “Operation Saffron Rose” to document the activities of the Iranian hacking group named Ajax Security Team According to a recent report titled “Operation Saffron Rose” published by cybersecurity company FireEye, a group called the Ajax Security Team is the principal Iranian hacking group, it is responsible for different espionage campaigns on custom-built malicious software. “This group, which […]
Unknown hackers have stolen files on the Ukraine crisis from the Belgian Foreign Ministry, causing the crackdown of targeted servers. A new cyber espionage campaign hit the Belgian foreign ministry, unknown hackers have stolen data related to the Ukraine crisis last week. The cyber attack has caused the crackdown of targeted servers which has left diplomats without […]
Who is abusing of forged SSL certificates in MITM attacks worldwide? A team of researchers implemented a new detection technique to detect the abuses. A team of researchers at Carnegie Mellon University and engineers at Facebook have designed a detection technique for man-in-the-middle attacks over SSL on a large-scale. They analyzed the data extracting useful information, including the […]
Security researcher Mohammed Saeed has Identified Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data and much more. Security researcher Mohammed Osman Saeed has Identified Multiple Security Misconfiguration in Juniper Online Service’s Lead to Expose Sensitive data & Lead to Control four Juniper Load-Balancer been accessed From Remote. He also disclosed Multiple XSS in […]
Entities claiming to be part of Anonymous collective are working to put together a secure communications project named Airchat based on ham-radio Fldigi modem controller. Entities claiming Anonymous affiliation are supporting the AirChat project, available for consultation on the Github, for the design of a secure communication based on the open source ham-radio Fldigi modem controller. “We traded bandwidth for freedom, or […]
US DoJ formalized a proposal to allow U.S Federal Agencies to secretly hack suspects’ computers to collect criminal evidence into investigations. The US Justice Department (DOJ) wants secretly hack into the suspected criminal’s computer during investigations at any times in bunches for collection of evidence. The document titled “COMMITTEE ON RULES OF PRACTICE AND PROCEDURE” defines […]
Security researcher Robert Graham published the results of recent global scan searching for Heartbleed vulnerable systems. 300k systems are still vulnerable Heartbleed flaw is a bug disclosed more than a month ago, which affected OpenSSL library with serious repercussion on most common encryption services we daily use. Encrypted communications, mobile platforms, VPN and Tor networks are just a […]
The Federal Trade Commission debated on the privacy ramifications of consumer generated and controlled health data, following data on mobile apps. The Federal Trade Commission has recently released the disconcerting results of a study conducted on 12 mobile health and fitness apps, focusing the analysis on the way they manage users’ personal information. Let me anticipate that […]
Alleged members of the hacking Team Digi7al were arrested by NCIS and charged for Hacking more than 30 government and private sites. The US attorney’s Office in Tulsa charged two men for involvement in anti government conspiracy, they are accused to have violated the computer systems of dozens of government and commercial organizations, including the […]
Experts at Imperva have illustrated how to exploit NTLM flaws to conduct a Windows folder Poisoning Attack and steal access rights within corporate networks. Security vendor Imperva revealed that attackers can exploit specifically crafted shortcut icons to hack Windows machines and force them into sharing their network-access rights with a hacked PC. The experts at Imperva have discovered […]