No-one wants to buy the Shadow Brokers’ stolen NSA tools
The Shadow Brokers – the hacker group who claimed to have stolen a large cache of National Security Agency (NSA) hacking tools – is disappointed to find that it’s theRead More →
The Shadow Brokers – the hacker group who claimed to have stolen a large cache of National Security Agency (NSA) hacking tools – is disappointed to find that it’s theRead More →
The notorious hacker Peace_of_Mind has hacked and defaced the official hacking and trading forumw0rm.ws and doxed its alleged owners. ‘Peace_of_Mind‘ (PoM) is a very active actor in The Real Deal Market and The Hell blackRead More →
The online storage platform Dropbox suffered a massive blow back in August when the company learned that over 60 million of its user accounts got hacked and credentials stolen byRead More →
With just a mere 48 characters of code, Linux admin and SSLMate founder Andrew Ayer has figured out how to crash major Linux distributions by locally exploiting a flaw in systemd. AyerRead More →
The newly-discovered bug gives attackers the chance to execute code through the open-source JPEG 2000 codec. Cisco Talos researchers have uncovered a severe zero-day flaw in the OpenJPEG JPEG 2000Read More →
For now, nobody’s pointing fingers at North Korea An unknown attacker has hacked South Korea’s military cyber command center last month, state officials told local media outlet Yonhap News. GovernmentRead More →
Researchers present new DefecTor deanonymization attack. A team of scientists has come up with a new attack method that in the hands of certain adversaries can be used to deanonymizeRead More →
On Monday morning, a number of professionals in the aerospace industry received a rather mundane email containing a PDF ostensibly about the future of Russian aerospace programs, but which actuallyRead More →
The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeingRead More →
Recent research on web security and related topics. Provided and maintained by members and friends of the Chair for Network and Data Security, Horst Görtz Institute, Ruhr-University Bochum. Do youRead More →
Microsoft is planning to make its internally-used ‘white-box fuzzing’ bug-detection service available to external customers and partners. Microsoft is looking for testers for a new bug-detection service that will runRead More →
Angry customer goes on rampage in a French Apple Store, destroys iPhones, MacBooks with a steel ball (video) A dissatisfied French customer took his rage to another level when heRead More →
Fraudsters who hack corporate bank accounts typically launder stolen funds by making deposits from the hacked company into accounts owned by “money mules,” willing or unwitting dupes recruited through work-at-home job scams.Read More →
Yesterday, I stumbled on a post where a Reddit user named Haydaddict was alerting people about some hacked Steam accounts spreading malware. As I am always interested in new malware, I took a lookRead More →
AS IOS AND Android mature, the stand-off between platforms and hackers escalates in kind. Each release brings new security measures, while those who want to break in—nation-state intelligence agencies andRead More →
The latest Android.Lockscreen variants are using new techniques to improve their chances of obtaining ransom money. New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devicesRead More →
An Israeli company is marketing what appears to be an astonishing surveillance capability, claiming it can siphon off all WhatsApp chats, including encrypted communications, from phones within close proximity of a hidden Wi-FiRead More →
Kaspersky posted a great article about their TeamXrat Ransomware analysis and how they were able to create a decryptor for its victims. Reported back in mid September in our forums, I and other security researchersRead More →
Misconfigured server led to Encryptor RaaS’ downfall. After law enforcement seized servers belonging to Encryptor RaaS, a Ransomware-as-a-Service cyber-crime portal, the site’s operators decided to close it down for goodRead More →
GozNym botnet included over 23,000 infected victims. The Cisco Talos team has announced today that they’ve successfully managed to sinkhole one of GozNym’s botnets and are in the process ofRead More →