Hacking

Pierluigi Paganini August 24, 2017
Ropemaker attack allows to transform email in malicious ones after it’s received

The Ropemaker attack allows hackers to turn an apparently harmless email into a malicious one after it has already been delivered to the victim’s inbox? What about a technique that could allow an attacker to turn an apparently harmless email into a malicious one after it has already been delivered to the victim’s email inbox? […]

Pierluigi Paganini August 24, 2017
Fancy Bears release data on soccer players’ TUE drug use and doping cases

Russia-linked hackers Fancy Bears claimed that around 160 football players failed drug tests in 2015, and 25 2010 World Cup players used doping medicines. A self-styled hacker group that calls itself Fancy Bears has set up the website fancybear.net to leak emails and medical records related to football players who used doping substances under a campaign dubbed OpOlympics. The group […]

Pierluigi Paganini August 23, 2017
Fappening 2017 – Private pictures of Miley Cyrus, Stella Maxwell, and others leaked

Fappening 2017 – Private pictures of Miley Cyrus, Stella Maxwell, Kristen Stewart, Tiger Woods and Lindsey Vonn have been posted online by a celebrity leak website. It has happened again, another wave of Fappening makes the headlines. Once again celebrities have been targeted by crooks, and unfortunately, they continue to ignore security fundamentals. Once again […]

Pierluigi Paganini August 22, 2017
Experts at ZDI reported two critical Zero-Day flaws in Foxit PDF Reader

Experts found two critical zero-day flaws in the Foxit PDF Reader that could be exploited by attackers to execute arbitrary code on a targeted computer Security researchers have discovered two critical zero-day vulnerabilities in the popular Foxit Reader application that could be exploited by attackers to execute arbitrary code on a targeted computer, if not […]

Pierluigi Paganini August 22, 2017
Ourmine hacked PlayStation Social Media Accounts to announce the theft of PSN Database

Ourmine hacker crew hijacked the official Twitter and Facebook accounts for Sony PlayStation Network (PSN) on Sunday and claims to have stolen PSN database. The dreaded Ourmine hacker crew is back, after the recent hack of social media accounts of HBO and Game of Thrones, the team hijacked the official Twitter and Facebook accounts for Sony […]

Pierluigi Paganini August 21, 2017
Mr.Smith, HBO hackers threaten to leak final episode of Game of Thrones 7

The bad actors behind the HBO hack are back and are threatening to leak the final episode of the seventh season of Game of Thrones. The threat actor that has hacked into the HBO announced that it will leak the final episode of Game of Thrones season 7.The hacker who claimed the responsibility for the hack […]

Pierluigi Paganini August 21, 2017
Enigma platform hacked, hackers stole over $470,000 worth of Ethereum

Enigma platform hacked – Another cyber heist made the headlines, this time an unknown hacker has stolen more than $471,000 worth of Ethereum cryptocurrency. The hacker has stolen it from the cryptocurrency investment platform, Enigma. According to an announcement made on Enigma website, an “unknown entity” has hacked their website, slack accounts and email newsletter accounts. “WARNING: ENIGMA SLACK […]

Pierluigi Paganini August 21, 2017
New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and supporting drone missions A news batch of documents leaked by former NSA contractor Edward Snowden has revealed a United States facility located in Australia’s Northern Territory for covertly monitoring wireless communications and supporting US drone […]

Pierluigi Paganini August 20, 2017
Hackers can completely hijack a mobile device via replacement of a touchscreen

Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components that are replaced. According to a team of researchers at the Ben-Gurion University of the Negev, this technique can give hackers complete control over the device. “Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, […]

Pierluigi Paganini August 19, 2017
Turla APT group adapts KopiLuwak backdoor for use in G20-themed attack

Security experts at Proofpoint have collected evidence that suggests that the Turla APT group is conducting a new espionage campaign. The experts discovered a newly dropper for the KopiLuwak backdoor, KopiLuwak is a JavaScript malware that was spotted early this year while the APT was delivering it to at least one victim leveraging a document containing an official letter from […]