HackDig : Dig high-quality web security articles for hacker

Reading the 2016 Internet Crime Complaint Center (IC3) report

According to 2106 Internet Crime Complaint Center (IC3) report, 298,728 complaints were received in 2016 totaling more than $1.3 billion in financial loss. According to the new edition of the Internet Crime Complaint Center (IC3) report, 298,728 complaints were received in 2016 totaling more than $1.3 billion in financial loss. The annual FBI’s Internet Crim
Publish At:2017-06-26 08:45 | Read:127 | Comments:0 | Tags:Breaking News Cyber Crime Reports BEC Cybercrime IC3 Interne

Company fired an employee, he shut down water utility providers’ networks in 5 cities

A former employee was sentenced to one year and one day in prison for damaging the IT networks of several water utility providers across the US East Coast. Adam Flanagan (42) of Bala Cynwyd, PA was sentenced to one year and one day in prison by a Pennsylvania court for damaging the IT networks of several water utility providers across the US East Coast. The
Publish At:2017-06-26 08:45 | Read:93 | Comments:0 | Tags:Breaking News Cyber Crime Hacking insider TGB water utility

SamSam ransomware attacks increase and crooks demand higher ransom

Researchers at AlienVault observed a significant increase in the number of SamSam ransomware attacks, crooks are demanding $33,000 to the victims. Security experts at AlienVault have observed a new string of attacks leveraging the SamSam ransomware, and this time crooks are demanding a $33,000 ransom to decrypt the files. According to the researchers, crooks
Publish At:2017-06-25 14:20 | Read:150 | Comments:0 | Tags:Breaking News Malware Cybercrime malware Samsam ransomware

UK Parliament shut down external access to email accounts after cyberattack

The UK Parliament has suffered the biggest ever cyber attack against the email systems, it shut down external access to mitigate the threat. The UK Parliament has shut down external access to e-mail accounts on Saturday after a cyberattack. According to the authorities, the attack was “sustained and determined,” hackers launched a prolonged brute
Publish At:2017-06-25 14:20 | Read:64 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence dara breach

Security Affairs newsletter Round 116 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      BAE Systems accused of selling mass surveillance software Evident across the Middle East ·      Facebook inadvertently revealed moderators identities to suspected terrorists ·      Kasperagent malware used in a new campaign leveraging
Publish At:2017-06-25 14:20 | Read:151 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

32TB of Windows 10 internal builds and portions of core source code leaked online

A massive dump of Microsoft’s confidential Windows 10 internal builds, and the source codes for private software has been leaked online. A huge trove of Microsoft internal Windows operating system builds and portions of core source code have leaked online. The news was first reported by The Register, the 32TB of official and non-public installation ima
Publish At:2017-06-24 19:56 | Read:128 | Comments:0 | Tags:Breaking News Data Breach Hacking data breach data leak Micr

Stealing AES-256 keys in seconds using €200 of off-the-shelf components

Security experts at Fox‑IT have demonstrated that is possible sniff AES-256 encryption keys from a distance of one meter (3.3 feet) with a cheap equipment. Security experts at Fox‑IT have demonstrated that is possible to power a side-channel attack to wirelessly extract secret AES-256 encryption keys from a distance of one meter (3.3 feet). The researchers u
Publish At:2017-06-24 19:56 | Read:92 | Comments:0 | Tags:Breaking News Hacking AES-256 encryption Pierluigi Paganini

US intelligence claims Russian hackers probed electoral networks in 21 US states

According to the US intelligence, Russian hackers tried to compromise electoral networks in 21 unnamed US states, but voting tallies hadn’t been hacked. According to Homeland Security officials, the attack against the 2016 Presidential election was more sophisticated than first thought. In a public hearing into the Russian interference in the 2016 Pres
Publish At:2017-06-24 19:56 | Read:122 | Comments:0 | Tags:Breaking News Cyber warfare Hacking electoral networks Pierl

The CIA was aware of Putin’s order to support the Trump Presidential campaign candidacy

The CIA was aware since August that President Putin personally ordered an operation to support Donald Trump presidential race. The intelligence shocked the White House and put US security chiefs on a top-secret crisis footing to figure out how to react. According to the Washington Post, CIA was aware since August that President Putin personally ordered an op
Publish At:2017-06-24 19:55 | Read:190 | Comments:0 | Tags:Breaking News Cyber warfare

Experts devised the GhostHook Attack technique to bypass Windows 10 PatchGuard Protections

Experts have devised the GhostHook Attack technique to install rootkits on machines running the Windows 10 operating system. Security flaws in Microsoft PatchGuard kernel protection could be exploited by attackers to install rootkits on machines running the secure Windows 10 operating system. The PatchGuard, also known as Kernel Patch Protection, is a softwa
Publish At:2017-06-24 01:30 | Read:204 | Comments:0 | Tags:Breaking News Hacking GhostHook attack PatchGuard Windows 10

UK politicians’ login credentials up for sale in the dark web

Russians hackers are offering for sale on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. According to The Times, Russians hackers are selling on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. Journalists at the British newspaper have found two huge lists of st
Publish At:2017-06-24 01:30 | Read:212 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web dara breach D

Brutal Kangaroo is the CIA tool suite for hacking Air-Gapped Networks

WikiLeaks has published a new batch of Wikileaks documents that detail the Brutal Kangaroo tool suite for hacking Air-Gapped Networks. WikiLeaks has published a new batch of documents belonging to the Vault 7 leak, the last archive includes the documentation related to a tool dubbed Brutal Kangaroo used by the CIA for Microsoft Windows that targets air-gappe
Publish At:2017-06-23 07:05 | Read:148 | Comments:0 | Tags:Breaking News Hacking Intelligence Brutal Kangaroo Vault7

Drupal fixes the CVE-2017-6922 flaw exploited in spam campaigns in the wild

Drupal team released security updates to fix several vulnerabilities, including the critical access bypass flaw CVE-2017-6922 exploited in spam campaigns. The Drupal development team has released security updates to fix several vulnerabilities, including the critical access bypass flaw tracked as CVE-2017-6922 that has been exploited in spam campaigns. The C
Publish At:2017-06-23 07:05 | Read:114 | Comments:0 | Tags:Breaking News Hacking CMS CVE-2017-6922 Cybercrime Drupal Pi

OpenVPN fixed several remotely exploitable flaws that were not detected by recent audits

OpenVPN fixed several vulnerabilities that could be exploited by remote attackers, the flaws were not detected in a recent audit. Recently two distinct audits were conducted to discover security issues in the OpenVPN, many flaws were found but some vulnerabilities were not spotted by the experts. Four of the vulnerabilities in OpenVPN 2.4.2, were found by th
Publish At:2017-06-23 07:05 | Read:155 | Comments:0 | Tags:Breaking News Hacking OpenVPN RCE exploit

Two men suspected of being part of international plot to hack Microsoft networks

British Police arrested two men suspected of being member of a large organization than plans to hack Microsoft Networks. Investigators have arrested two men in the UK in connection with an international plot to hack the Microsoft network. Agents at the South East Regional Organised Crime Unit, are investigating “unauthorised intrusion into networks tha
Publish At:2017-06-23 07:05 | Read:118 | Comments:0 | Tags:Breaking News Cyber Crime

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud