iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access […]
According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD) Â database is open to intrusion. According to the results of an internal review of the US State Department, the Consular Consolidated Database (CCD) is vulnerable to cyber attacks. The State Department considers the CCD as an âunclassified but […]
The federal bureau of investigation issued an alert related the APT6 state-sponsored hacking group that has compromised the US Government networks for years. The FBI revealed that âa group of malicious cyber actors have compromised and stolen sensitive information from various government and commercial networksâ since at least 2011. The alert was published online by AlenVault […]
Two forensics experts have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the compromised machine. At the last Black Hat Asia, the forensics experts Matt Hastings and Ryan Kazanciyan from Tanium have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the compromised machine. The DSC […]
Which is the source of Panama Papers? According to Mossack the hackers breached its systems, according to the experts its email server was breached. The Panama Papers is a huge trove of strictly confidential documents from the Panamanian law firm Mossack Fonseca was leaked online during the weekend, it is largest data leaks ever. The entire archive […]
A database containing records of 50 Million Turkish Citizens appeared online in the weekend. Is it a new or a recycled archive? Details of almost 50 Million Turkish citizens have been leaked online, the bulk data was hosted on a server with the IP address 185.100.87.84. The archive was published during the weekend, the publishers claim they it belongs […]
US and UK are planning to simulate a cyber attacks on nuclear plants, to test their resilience in the light of the nuclear security summit. In the light of the recent events with the terrorist attacks in Europe, the fear of other similar threats becomes greater by the minute. Coordinates cyber attacks on nuclear plants would […]
The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to the German weekly Der Spiegel, the German intelligence Agency BND (Bundesnachrichtendienst) has reportedly been spying on Israel for years. The Prime Minister Benjamin Netanyahu’s Office is one of the main targets of the espionage activity, […]
Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two of security researchers from the Weizmann Institute have shown how hackers can target connected lightbulbs to steal sensitive data from Air-Gapped networks. The two researchers are Adi Shamir, the popular co-inventor of the RSA algorithm, and PHD student […]
Officials confirmed that the Hungarian government website came under attack from outside the country. The access to many websites was blocked. The Hungarian Government announced that its computer network was targeted by a major cyber attack that temporarily blocked the access to several websites. The attacks hit the main Hungarian government website and many other sites, including […]