Monthly Archives: June 2016
PunkeyPOS might have already stolen millions of payment card numbers
Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen millions of payment card numbers. Security experts from PandaLabs spotted a new strain of […]
Fansmitter – exfiltrating data from Air-Gapped devices via fan noises
Fansmitter is a new acoustic data exfiltration method devised by a group of researchers from Ben-Gurion University of the Negev. We all know that air-gapped networks aren’t totally secure, in the past, […]
Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking
A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the […]
BadTunnel attack affects all versions of Windows
A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of Windows. The Chinese researcher Yang Yu, director of Xuanwu Lab of Tencent has discovered […]
GoToMYPC targeted by a very sophisticated password attack
A number of users are experiencing problems during logging into GoToMyPC because Citrix reset account passwords after hackers reportedly attacked it. It’s official, the GoToMyPC service operated by Citrix is the […]
Adobe patches Flash Zero-Day exploited by ScarCruft APT
Adobe Flash Player 22.0.0.192 release fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft. Adobe has issued the Flash Player 22.0.0.192, a release that fixes the Flash […]
Singapore will isolate Government Computers from the Internet
The Government of Singapore will cut off civil servants’ work computers from the Internet in order to secure Government networks. The Singapore’s prime Minister Lee Hsien Loong confirmed this week […]
CRYPTXXX campaigns, threat actors switch to Neutrino EK
Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the Angler Exploit Kit. Crooks behind the CryptXXX ransomware have launched a new […]
WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images
WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters’ Twitter accounts and flood their profiles with PORN picture and irreverent messages. Anonymous is continuing its online battle against the ISIS propaganda […]
How to recover files encrypted by all Teslacrypt Ransomware variants
Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the Teslacrypt Ransomware variants In May, the criminals behind the TeslaCrypt ransomware leaked […]
Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs
Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by the car vendor. A team of experts from the UK […]
Jacob Appelbaum leaves the Tor Project after accusation of sexual misconduct
The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is recognized as one of the most active and influential digital […]
FastPOS PoS malware implements a quick exfiltration method
Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration technique. Security experts at Trend Micro have spotted a new […]
Power plant ICS threatened by an easy remotely exploitable flaw
The independent researcher Maxim Rupp reported an unpatchable flaw in the ICS Environmental Systems Corporation (ESC) 8832 Data Controller. Vulnerable SCADA and industrial control systems represent the entry point in critical infrastructure for hacking […]
Hacking NTP Servers from Long-Distance with low cost devices
A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive equipment. The HACK IN THE BOX conference is a hotbed of interesting […]