Crowdfunding initiative aims to buy Shadow Brokers leak before threat actors will start using the hacking tools and exploits in the wild. The Shadow Brokers hacker group is going to launch a monthly subscription model for its data dumps, 0-Day Exploit Subscriptions goes for (100 Zcash), approximately $24,450 per month. The hacking tools and exploits that will […]
Russian President Putin says patriotic hackers may have powered attacks against foreign countries and denied Russia involvement. President Vladimir Putin says patriotic hackers may have launched cyber attacks against foreign countries and but denied Russia involvement in cyber espionage campaigns. Russian state-sponsored APT groups area accused of continuous interferences with 2016 US Presidential Election elections […]
OneLogin company announced on Thursday that it had “detected unauthorised access” in its systems located in the United States. OneLogin is a leading identity and access management software vendor providing an identity-driven enterprise security solution. OneLogin is a popular password manager used by many Internet users to allow management of complex passwords as requested by […]
Wikileaks released a new lot of documents belonging to the Vault7 dump that details the CIA project codenamed ‘Pandemic implant’ Wikileaks released a new batch of documents belonging to the Vault7 archive related to the CIA project codenamed ‘Pandemic.’ RELEASE: CIA 'Pandemic' Windows infection malware documentation #Vault7 https://t.co/YfxAKT1pog pic.twitter.com/HhmmvUBupi — WikiLeaks (@wikileaks) June 1, 2017 The Pandemic […]
A top defense contractor left tens of thousands sensitive Pentagon documents on Amazon Server Without any protection in places. The popular security expert Chris Vickery discovered more than 60,000 sensitive files belonging to a US military project for the National Geospatial-Intelligence Agency (NGA) left on Amazon cloud storage server without authentication. The documents were reportedly left unsecured on […]
Security researchers at Qualys Security have discovered a Linux Flaw that could be exploited to escalate privileges and overwrite any file on the filesystem. Security researchers at Qualys Security have discovered a Linux flaw that could be exploited to gain root privileges and overwrite any file on the filesystem on SELinux-enabled systems. The high severity flaw, tracked […]
Experts found a new malware, dubbed Judy malware, in the Play Store, it is designed to infect Android devices and generate false clicks on advertisements. Google is suffering once again from malicious software applications found inside popular apps available on Play store. The new malware – code named “Judy” – is designed to infect Android […]
A developer has discovered a flaw in the Chrome browser that could be exploited to secretly Record Audio/Video without indication. The AOL developer Ran Bar-Zik discovered a disconcerting vulnerability in Google’s Chrome browser could be exploited by attackers to record audio or video without giving any visual notification or alert. “After getting the audio\video usage […]
Moscow-based threat intelligence firm Group-IB published a report that details evidence linking the Lazarus APT Group to North Korea. Researchers at security firm Group-IB released a report that links the notorious Lazarus APT to North Korea. The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks […]
According to a report published by Juniper Research, the economic impact of cybercrime is expected to reach $8 trillion price tag over the next five years. According to a report published by Juniper Research, the number of data records that will be compromised in security breaches in 2017 will reach 2.8 billion. The economic impact of […]