Breaking News

Pierluigi Paganini August 22, 2017
Experts at ZDI reported two critical Zero-Day flaws in Foxit PDF Reader

Experts found two critical zero-day flaws in the Foxit PDF Reader that could be exploited by attackers to execute arbitrary code on a targeted computer Security researchers have discovered two critical zero-day vulnerabilities in the popular Foxit Reader application that could be exploited by attackers to execute arbitrary code on a targeted computer, if not […]

Pierluigi Paganini August 22, 2017
Ourmine hacked PlayStation Social Media Accounts to announce the theft of PSN Database

Ourmine hacker crew hijacked the official Twitter and Facebook accounts for Sony PlayStation Network (PSN) on Sunday and claims to have stolen PSN database. The dreaded Ourmine hacker crew is back, after the recent hack of social media accounts of HBO and Game of Thrones, the team hijacked the official Twitter and Facebook accounts for Sony […]

Pierluigi Paganini August 21, 2017
Mr.Smith, HBO hackers threaten to leak final episode of Game of Thrones 7

The bad actors behind the HBO hack are back and are threatening to leak the final episode of the seventh season of Game of Thrones. The threat actor that has hacked into the HBO announced that it will leak the final episode of Game of Thrones season 7.The hacker who claimed the responsibility for the hack […]

Pierluigi Paganini August 21, 2017
Enigma platform hacked, hackers stole over $470,000 worth of Ethereum

Enigma platform hacked – Another cyber heist made the headlines, this time an unknown hacker has stolen more than $471,000 worth of Ethereum cryptocurrency. The hacker has stolen it from the cryptocurrency investment platform, Enigma. According to an announcement made on Enigma website, an “unknown entity” has hacked their website, slack accounts and email newsletter accounts. “WARNING: ENIGMA SLACK […]

Pierluigi Paganini August 21, 2017
New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and supporting drone missions A news batch of documents leaked by former NSA contractor Edward Snowden has revealed a United States facility located in Australia’s Northern Territory for covertly monitoring wireless communications and supporting US drone […]

Pierluigi Paganini August 21, 2017
SyncCrypt Ransomware hides its components in image files

A new strain of ransomware distributed through spam emails, dubbed SyncCrypt, hides its components inside harmless-looking images. A new strain of ransomware recently discovered, dubbed SyncCrypt, hides its components inside harmless-looking images. The SyncCrypt ransomware is distributed through spam emails that use attachments containing WSF files pretending to be court orders. Once the victims execute the attachment, an embedded JScript fetches seemingly innocuous images from specific locations and […]

Pierluigi Paganini August 20, 2017
Security Affairs newsletter Round 124 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Anti-Israel and pro-Palestinian IsraBye wiper spreads as a ransomware ·      Kenya opposition claims election results manipulated in cyber attack ·      MUGHTHESEC, a signed Mac adware that hijacks the victims browser for profit ·      Security Affairs newsletter […]

Pierluigi Paganini August 20, 2017
Learning About ISIS Intentions Using Open Source Intelligence

Learning About ISIS Intentions Using Open Source Intelligence – How terrorists are exploiting technology for propaganda and radicalization. ISIS’ weekly newsletter al-Nabā’ published an editorial about the lessons to be learned from the attack on the Iraqi embassy in Kabul, Afghanistan (July 30, 2017), which it called “an action of high quality.” In the editorial, attacking […]

Pierluigi Paganini August 20, 2017
Hackers can completely hijack a mobile device via replacement of a touchscreen

Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components that are replaced. According to a team of researchers at the Ben-Gurion University of the Negev, this technique can give hackers complete control over the device. “Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, […]

Pierluigi Paganini August 19, 2017
Barcelona terrorist attack – Extremism, A Sea Change In Tactics

Analysts at Global Intelligence Insight analyzed the recent Barcelona terrorist attack linking it to the content shared recently in the Jihadist community. Another terrorist attack took place in a European city, this time in Barcelona; just south of the city in the tourist resort of Cambrils a number of potential suicide bombers have been shot dead; […]