Hacking

Pierluigi Paganini December 20, 2015
FBI investigates on Juniper hack, is it a nation-state attack?

The FBI is investigating on the unauthorized code found in the operating system running on firewalls sold by Juniper Networks. The FBI confirmed that is investigating on the alleged breach of Juniper Networks VPN software that resulted in the introduction of unauthorized code in the OS running on Juniper firewalls. Juniper Networks makes communications equipment for enterprises […]

Pierluigi Paganini December 19, 2015
Over 650 terabytes of MongoDB data exposed on Internet

The popular expert and Shodan creator John Matherly found over 650 terabytes of MongoDB data exposed on the Internet by vulnerable databases. Last week my old hosting provider GoDaddy created me a lot of problems so I had no opportunity to write about this interesting story, now I passed to a better provider and I […]

Pierluigi Paganini December 19, 2015
Instagram hacked! Hacker compromised the entire platform

The researcher who hacked Instagram claims he was threatened by Facebook after he responsibly reported a series of security issues. Every platform is potentially hackable, even the armored Facebook and Instagram and the independent security researcher Wesley Weinberg has demonstrated it. Of course, if the hackers ethically report the flaw to the company usually nothing happen, but the […]

Pierluigi Paganini December 18, 2015
Hackers trace ISIS Twitter accounts back to the UK govt

A group of hackers known as VandaSec claims three ISIS Twitter accounts trace back to computers belonging to the UK government. According to the revelation of a group of hackers known as VandaSec, at least three Islamic State Twitter social media accounts are run from IP addresses linked to the British government’s Department for Work and […]

Pierluigi Paganini December 18, 2015
Unauthorized code found in Juniper’s firewall OS

An operating system running on firewalls sold by Juniper Networks contains unauthorized code that could be exploited to decrypt traffic sent through virtual private networks. An “unauthorized code” was discovered in the operating system for Juniper NetScreen firewalls. The company admitted the presence of the “unauthorized code” that could allow an attacker to decrypt VPN traffic. [“unauthorized code”] “could allow […]

Pierluigi Paganini December 17, 2015
Phantom Squad wants to take down Playstation network and Xbox Live on Christmas

Playstation network and Xbox Live risk to be taken down on Christmas by an anonymous group of hackers known as the Phantom Squad. If you remember, last Christmas, both PlayStation network and Xbox Live were took down by hackers belonging to the group of hackers known as Lizard Squad. It looks like this year this […]

Pierluigi Paganini December 17, 2015
Press backspace 28 times to hack a Linux PC with Grub2

The researchers Hector Marco and Ismael Ripoll have found that the Grub2 authentication could be easily defeated by hitting backspace 28 times. A couple of researchers from the University of Valencia’s Cybersecurity research group, Hector Marco and Ismael Ripoll, have found that the Grub2 bootloader is plagued by a serious vulnerability that can be exploited by […]

Pierluigi Paganini December 17, 2015
GCHQ Gaffer database goes open source

The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it “easy to store large-scale graphs in which the nodes and edges have statistics such as counts, histograms and sketches.”, its code is available for download on the code-sharing website Github. “Gaffer is […]

Pierluigi Paganini December 16, 2015
Joomla under attack due to a zero-day. Patch your CMS now!

The websites based on the popular Joomla CMS need to be updated as soon as possible due to a critical remote code execution vulnerability. The websites based on the popular Joomla CMS need to be updated as soon as possible, Joomla has just released a security patch to fix a critical eight-year-old remote code execution vulnerability. […]

Pierluigi Paganini December 16, 2015
FireEye Appliances affected by a critical flaw simply exploitable

Security experts at the Google Project Zero team have discovered a critical flaw in FireEye appliances that could be exploited via email. A remote code execution vulnerability dubbed “666” affect FireEye Appliances, hackers can exploit the flaw simply by sending an email or tricking users into clicking on a link. The 666 vulnerability resided in […]