Hacking

Pierluigi Paganini August 20, 2017
Hackers can completely hijack a mobile device via replacement of a touchscreen

Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components that are replaced. According to a team of researchers at the Ben-Gurion University of the Negev, this technique can give hackers complete control over the device. “Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, […]

Pierluigi Paganini August 19, 2017
Turla APT group adapts KopiLuwak backdoor for use in G20-themed attack

Security experts at Proofpoint have collected evidence that suggests that the Turla APT group is conducting a new espionage campaign. The experts discovered a newly dropper for the KopiLuwak backdoor, KopiLuwak is a JavaScript malware that was spotted early this year while the APT was delivering it to at least one victim leveraging a document containing an official letter from […]

Pierluigi Paganini August 19, 2017
The Ukrainian central bank warned of new NotPetya-style massive attack risk

The Ukrainian central bank warned state-owned and private lenders of the appearance of new the NotPetya-like attack that would target national businesses. On Friday, the Ukrainian central bank warned of new malware-based attack risk. According to the Reuters, the Ukrainian central bank warned state-owned and private lenders of the spreading of new infections like the […]

Pierluigi Paganini August 18, 2017
Misconfigured AWS S3 exposed 1.8 million US voter records

More than 1.8 million voter records belonging to Americans have been accidentally leaked online by a US voting machine supplier for dozens of US states. It has happened again, more than 1.8 million voter records belonging to Americans have been accidentally leaked online by a US voting machine supplier for dozens of US states. The voter records were left […]

Pierluigi Paganini August 18, 2017
Hacker published the decryption key for the Apple Secure Enclave security chip

A hacker Thursday afternoon published what he claims to be the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware. The Apple Secure Enclave is an ARM-based coprocessor that enhances iOS security, but on Thursday a hacker published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware. According […]

Pierluigi Paganini August 17, 2017
Drupal maintainers fix several access bypass vulnerabilities in Drupal 8

Drupal maintainers this week released security updates to fix several access bypass vulnerabilities in Drupal 8. Update your installation. On Wednesday Drupal maintainers released security updates to fix several access bypass vulnerabilities in Drupal 8. The flaws affect several components, including the entity access system, the REST API and some views. The most severe vulnerability patched by Drupal 8.3.7 is a critical issue, tracked as CVE-2017-6925 that affects […]

Pierluigi Paganini August 17, 2017
Cyber Criminals Hijack Chrome Extensions and put 4.7 Million Users at Risk

Developer accounts of popular chrome extensions being hijacked by cyber criminals, over 4.7 million users are at a risk of cyber attack. Over 4.7 million users could be at risk after being exposed to malicious adverts and credentials theft due to developer accounts of popular chrome extensions being hijacked by cyber criminals. A phishing campaign […]

Pierluigi Paganini August 17, 2017
After Westminster attack, now Scottish parliament hit by brute-forcing attack

The Scottish Parliament has been targeted by a “brute force” attack, the assault is still ongoing and is similar to the one that hit the British Parliament. The Scottish Parliament is under attack, crooks are brute-forcing email accounts in the attempt to access members’ emails. The attack appears similar to the one that in June […]

Pierluigi Paganini August 16, 2017
DitM Dog In The Middle – New Hacking Technique to Eavesdropping

During Defcon 25 hacking conference held in Las Vegas on July, a new eavesdropping attack technique was introduced, it was dubbed DitM (Dog In The Middle). During Defcon 25 one of the biggest information security event that took place in Las Vegas on July 27-30 this year, a new eavesdropping attack technique was introduced. At […]

Pierluigi Paganini August 16, 2017
ShadowPad backdoor was spread in corporate networks through software update mechanism

Kaspersky Lab discovered attackers were able to modify the NetSarang software update process to include a malware tracked as ShadowPad backdoor. Software update mechanism could be an efficient attack vector, news of the day is that hackers compromised the update process for a popular server management software package developed by NetSarang. Attackers were able to […]