Writing Exploits for Win32 Systems from Scratch
This post is aimed at those new to exploit development and wanting to understand the end-to-end process and types of techniques that need to be employed in order to realiseRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
This post is aimed at those new to exploit development and wanting to understand the end-to-end process and types of techniques that need to be employed in order to realiseRead More →
Short Bytes: Teardrop attack is a type of Denial of Service (DoS) attack which exploits the fragment offset field in the IP header to produce buggy fragments which are then deliveredRead More →
Criminals infected over 200 US businesses with PunkeyPOS. Security researchers from PandaLabs have hacked their way into the administration panel of the PunkeyPOS point-of-sale malware and have discovered an ongoing campaignRead More →
Here at Integrity we love to be challenged, so whenever there is some free time, there is encouragement to do research or to break some things (https://labs.integrity.pt/advisories/) in addition toRead More →
The central banks of Indonesia and South Korea have been hit by distributed denial of service attacks on their public websites, with officials linking the timing of the attacks toRead More →
In an effort to develop a target base and increase the conversion rate of victims, ransomware perpetrators will try to veer away from well-known families and create new family sportingRead More →
OurMine, the same group that hacked Mark Zuckberg’s Pinterest and Twitter accounts, seems to be behind it. Even the former CEO of Twitter isn’t protected from the occasional security hack.Read More →
An unnamed hacker hacked the video conferencing software used by the Quebec Liberal Party and shared the news with the media. Politicians are a privileged target of hackers, in manyRead More →
The employee tried to cash in by stealing and selling the data of up to 1.5 million Czech customers. T-Mobile’s arm in the Czech Republic has uncovered an employee’s intentionsRead More →
Incident seems to be another ATO (account takeover) attack.GoToMyPC decided to reset user passwords after attackers tried to hack into customer accounts over the weekend using what the company callsRead More →
Lost info includes names, addresses, numbers and security codes. Acer’s insecure customer database spilled people’s personal information – including full payment card numbers – into hackers’ hands for more than aRead More →
DAO had just raised $150 million in record crowdfunding effort. A futuristic technology experiment appears to have fallen prey to a common technological risk, as operators of a new investment fundRead More →
Today the federal Government Accountability Office (GAO) finally published its exhaustive report on the FBI’s face recognition capabilities. The takeaway: FBI has access to hundreds of millions more photos thanRead More →
Repository’s own account data not breached, affected passwords reset. On June 14, someone using what appears to have been a list of e-mail addresses and passwords obtained from the breach ofRead More →
A researcher in China has discovered a design flaw in Microsoft Windows that affects all versions of the operating system—including Windows 10—and lets an attacker hijack a victim organization’s networkRead More →
Man arrested after Mossack Fonseca filed official complaint. An IT manager for Panamanian law firm Mossack Fonseca was arrested yesterday in Geneva, Switzerland, on suspicion of data theft, Swiss newspaper LeRead More →
Even where users have chosen strong passwords and taken extrasecurity measures, their Facebook FB -0.29% accounts are not safe from hackers. Researchers have proven just that by taking control of a FacebookRead More →
Over the last two years, deep in the slums of the Internet, a different kind of underground market has flourished. The short, cryptic name perhaps doesn’t say much about it:Read More →
Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according toRead More →
Vpon is one of many mobile ad SDKs marketed towards mainland Chinese and Taiwanese developers and app users. Recently, FireEye mobile security researchers identified a branch of Vpon ad SDKRead More →