The Navis WebAccess application used in the transportation sector worldwide is affected by a high severity SQL injection vulnerability. A software used in the US ports is affected by a high severity SQL Injection vulnerability (CVE-2016-5817). The flaw was discovered by a hacker behind the online moniker âbRpsd,â the expert has discovered the vulnerability in […]
Today I have interviewed Mr C, aka @NotCracka another interesting figure of the hacking community. Enjoy the Interview. Could you tell me which his your technical background and when you started hacking? The unique technical background I have is related my participation to the Anonops IRC where people teach me about advanced web attacks, including the […]
IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I love some of the gangster nicknames people come up with. Knuckles, Fat Tony , Stab Happy or even Bambi. Names are characteristic of their personality and attitude. Itâs time to add Toaster Socket to the […]
The Epic Games forums hacked again, more than 800,000 logins accounts have been stolen, with more than half a million from Unreal Engine’s forums. Epic Games forums breached again, salted passwords of 808,000 Unreal Engine and Unreal Tournament forum accounts have been exposed. The stolen records from Epic Games include email addresses, birth dates, and […]
A security expert analyzed a BHU Wi-Fi router and found that it is easy to hack by an unauthenticated attacker that can access sensitive information. Tao Sauvage, an expert from IOActive, has analyzed a BHU Wi-Fi router that he purchased during a travel. The BHU Wi-Fi router appears like a surveillance box, but according to the […]
A group of researchers demonstrated that a number of existing facial recognition systems can be fooled by 3D facial models made from Facebook photos. Facial recognition systems still have a certain margin of error, for example, trying to identify people of color. A group of researchers from the University of North Carolina demonstrated that a number […]
A security expert noticed strange transactions from the Bitcoin wallet of the SilkRoad (now in the hands of Feds) to the ShadowBrokers ‘ wallet. I was surfing the Internet searching for interesting data about the ShadowBrokers group that leaked exploits and hacking tools belonging to the NSA Equation Group. I have found a very intriguing analysis […]
Researchers tested the BENIGNCERTAIN tool included in the NSA data dump that allows attackers to extract VPN passwords from certain Cisco devices. Following the disclosure of the NSA dump, IT vendors Cisco and Fortinet issued security patches to fix the flaws exploited by the Equation Group in their products. Now, security researchers have uncovered another […]
Iran âs cyberspace security authorities are investigating a string of fires in the country oil and gas facilities. Incidents or cyber sabotage? Once again, something of strange is happening in Iran, the Government of Teheran is investigating a recent string of incidents occurred in critical infrastructure in the country. The Iran’s Supreme National Cyberspace Council […]
The organization that controls the development of the Bitcoin software warns users that nation-state actors may hit the upcoming Bitcoin Core release. The organization that controls the development of the Bitcoin system, Bitcoin.org, has warned of possible cyber attacks coordinated by nation-state attackers. Bitcoin Core is the open source client for Bitcoin, the version Bitcoin Core […]