Media outlet continues to publish news regarding the DNC hack, computer servers used by Clinton campaign were compromised as part of DNC hack. The news of the recent Democratic National Convention (DNC) hack is monopolizing the technological debate around the US presidential campaign. Yesterday I reported the news of another hack against the operation of the DNC, according to the Reuters, […]
Another attack hit the Democratic Party organization, this time, the Democratic Party’s congressional fundraising DCCC committee was hit by hackers. The Democratic Party organization continues to be under attack, this time, the Democratic Party’s congressional fundraising committee was hit by hackers. According to the Reuters, the FBI is investigating a security breach of the systems of the […]
Today I have interviewed RazorBlade, (@JustAnotherBoat), another hacker involved in several hacking campaigns. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? Which are your motivations? I started hacking about 2 years ago but my curiosity allowed me to gain Alot of experience. What was your […]
Is it so easy to buy a weapon on the Dark Web? Access a dark net, buy a weapon, make a massacre. Is this the crime chain behind recent attacks? After mass shooting recently occurred in Germany the Dark Web monopolized the headlines. According to several German news outlets, the young man has bought the 9mm […]
Today I have interviewed one of the core members of the popular GhostSquadHackers crew, he is BannedOffLine, the Admin. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? Which are your motivations? I’ve participated in many operations. The one I’m known for was OpIcarus where I’d get in […]
Shad0w Security (Shad0wS3C) claimed responsibility for the data breach of the EJBCA that resulted in the exposure of credentials and certificates. Shad0w Security claimed responsibility for the data breach of the EJBCA – Open Source PKI Certificate Authority. Shad0w Security recently breached into a Switzerland Branch of EJBCA – Open Source PKI Certificate Authority and stole dozens of certificates […]
Experts discovered that Wireless keyboards from several vendors don’t use encryption when communicating with USB dongle being opened to KeySniffer attacks Security experts from Bastille firm have devised a method of attack dubbed KeySniffer to remotely intercept keystrokes or send commands to a targeted computer. The researchers have analyzed non-Bluetooth wireless keyboards from 12 manufacturers discovering that […]
Another interview with one of the black hat hackers on the internet, he is Revolxy from PøwerfulGreəkArmy hacker crew. Enjoy the Interview. You are a known hacker that has already participated in several hacking campaigns, could you tell me more about. I have participated in campaigns such as #OpTurkey , #OpISIS and #OpPedo. I’m targeting government […]
David S., the Munich gunman has purchased the weapon on the Dark Web, sincerely I was waiting for this title in the headlines, but … In Germany, it is quite difficult to pay for weapons so how the Munich gunman got a 9mm Glock 17? According to several German news outlets, the young man has bought the 9mm […]
The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy. A hacker has accessed and downloaded the source code of the Twitter’s Vine application. Vine is a short-form video sharing service, acquired by Twitter in 2012, that allows users to share small videos of 6 seconds […]