Submit UEFI Ransomware: Full Disclosure at Black Hat Asia
Last month at the RSA 2017 conference, we ran a live demo of Cylance’s UEFI Ransomware proof of concept at our ‘Hacking Exposed Next-Gen’ talk. In the demo, we targetedRead More →
Last month at the RSA 2017 conference, we ran a live demo of Cylance’s UEFI Ransomware proof of concept at our ‘Hacking Exposed Next-Gen’ talk. In the demo, we targetedRead More →
Nothing to fear, citizens. Keep consuming. Keep smiling. WikiLeaks has dumped online what appears to be a trove of CIA documents outlining the American murder-snoops’ ability to spy on people.Read More →
Docs claim CIA can defeat WhatsApp, Signal, Telegram encryption, among other apps. This morning, Wikileaks posted the first of what the organization’s spokesperson says is a multi-part series of documentsRead More →
Another day, another important security update for WordPress. Oh boy. If you administer your own self-hosted WordPress website then your must update the software as soon as possible, following theRead More →
A report published in the Conservation Biology magazine cites several incidents gathered from all over the world in the past years, where technologies introduced to simplify the work of animalRead More →
Hackers are selling the malware all over the dark web. Hackers are now selling malware for Mac devices straight out on the dark web. They claim the malware is undetectableRead More →
Meaner strain of Shamoon makes comeback, joined by new, never-before disk wiper. Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computersRead More →
Sometimes at Exploitee.rs, we look for fun devices to hack and sometimes the devices find us. Today we’re going to talk about a recent time where we found ourselves inRead More →
A flaw in Twitter allowed attackers to access locked accounts bypassing the locking mechanism implemented by the company. A flaw in the Twitter application allowed, until a few months ago,Read More →
A ransomware infection shut down the computer network of the Pennsylvania Senate Democratic Caucus on Friday morning, officials said in a statement issued to the local press. The infection affectedRead More →
The BitErrant attack is a fun little exploit that shows what can go wrong in the BitTorrent protocol when SHA1 collisions become reality. SHA1 collisions resulting in chunks of theRead More →
DOJ: “Disclosure is not currently an option.” Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal prosecutors in Washington state have dropped all chargesRead More →
Researchers encoded six files into DNA: a full computer OS, a movie, a $50 Amazon gift card, a computer virus, a Pioneer plaque, and a 1948 study by information theoristRead More →
A vulnerability discovered by Google Project Zero security researchers and left without a patch by Microsoft received a temporary fix from third-party security vendor ACROS Security. The vulnerability, tracked asRead More →
Exclusive: MalwareMustDie for Security Affairs released the list of the sites under attack. A criminal gang is using SSH TCP direct forward attack technique. MalwareMustDie is back and has published his theRead More →
Millions of IT professionals all over the world want to get into the hot field of security, and Metasploit is a great place to start. Metasploit Framework is free, usedRead More →
A new service launched on the Dark Web this week simplifies the process of tricking victims whose card details have been exposed into revealing their card’s PIN. The service, whichRead More →
HackerOne, a platform that is offering hosting for bug bounty programs, announced today that open-source projects can now sign up for a free bug bounty program if they meet aRead More →
Hi again, this is Shusei Tomonaga from the Analysis Center. In this article, I’d like to share some of our findings about ChChes (which we introduced in a previous article)Read More →
As a candidate, Trump VP castigated Clinton for use of a private e-mail server. As the US Republican vice presidential candidate, Mike Pence vigorously chastised Hillary Clinton for using aRead More →