HackDig : Dig high-quality web security articles for hacker

Malware signed with stolen Digital code-signing certificates continues to bypass security software

A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues to bypass security software. A recent study conducted by the Cyber Security Research Institute (CSRI) revealed that stolen digital code-signing certificates are available for sale for anyone to purchase on the dark web for up to $1,200. Digital cod
Publish At:2017-11-07 05:10 | Read:1689 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Malware Digital c

Paradise Papers were the result of the hack of external attackers

Most of the Paradise Papers came from offshore legal firm Appleby, which confirms the leak came from a hack on its network and no insiders were involved. The Paradise Papers is a collection of more than 13.4 million financial documents leaked online that has shed light on how major figures in the world of business, politics, entertainment, and sport move th
Publish At:2017-11-07 05:10 | Read:2032 | Comments:0 | Tags:Breaking News Data Breach Hacking Appleby data leak Panama P

Cisco patches a DoS vulnerability in IOE XE operating system

Cisco fixed a vulnerability in IOE XE software that was introduced due to changes to its implementation of the BGP over an Ethernet VPN. Cisco patches a DoS vulnerability in IOE XE software that was introduced due to changes to its implementation of the Border Gateway Protocol (BGP) over an Ethernet VPN. The Cisco IOS XE operating system automates network op
Publish At:2017-11-07 05:10 | Read:1832 | Comments:0 | Tags:Breaking News Security Vulnerability

One Third of The Internet Has Seen a DDoS Attack In The Past Two Years

A group of researchers has conducted a rigorous comprehensive characterization of this DDoS attacks and of countermeasures to mitigate the associated risks. Denial of Service (DoS) attacks have been around about as long as computers have been network connected. A website’s purpose is to accept connections from the Internet and return information. A bad
Publish At:2017-11-07 05:10 | Read:1490 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Reports botnet DDoS attack

The GIBON Ransomware appears in the threat landscape

A new strain of ransomware dubbed GIBON ransomware was spotted by the ProofPoint researcher Matthew Mesa that observed it being distributed via malspam. The spam messages use a malicious document as attachment containing macros that once enabled will download and install the ransomware on a victim’s machine. The researcher dubbed the ransomware GIBON b
Publish At:2017-11-06 10:45 | Read:434 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime GIBON Ransomwar

Hackers leak WhatsApp screenshots and intimate photos of WWE Diva Paige

A new batch of WhatsApp screenshots and intimate photos of the WWE celebrity Diva Paige was published on a popular celebrity leak website. In March, hackers leaked online nude photos and videos of WWE Diva Paige (real name is Saraya Jade-Bevis), and now a new batch of x-rated images of the celebrity appeared on the Internet. Personal and private photos of m
Publish At:2017-11-06 10:45 | Read:525 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities data lea

KRACK Detector is a tool to detect and prevent KRACK attacks in your network

How to discover if your network is vulnerable to KRACK attack? KRACK Detector is a script that can detect attacks against client devices on your network. Last week I published a post warning of many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). The Belgian research
Publish At:2017-11-06 10:45 | Read:471 | Comments:0 | Tags:Breaking News Hacking Internet of Things KRACK attack KRACK

Estonia suspends security digital certificates for up to 760,000 state-issued electronic ID-cards over Identity-Theft ri

It has happened, one of the most cyber-savvy states, Estonia decided to block Electronic ID Cards over identity theft risk. On Thursday, Estonia announced that it would suspend security digital certificates for up to 760,000 state-issued electronic ID-cards that are using the buggy chips to mitigate the risk of identity theft. The decision comes after IT sec
Publish At:2017-11-05 16:20 | Read:647 | Comments:0 | Tags:Breaking News Digital ID Security

US DoJ Identifies at least 6 Russian Government officials Involved in DNC hack

The United States Department of Justice has gathered evidence to charge at least six Russian government officials involved in the 2016 DNC hack. The United States Department of Justice has gathered evidence to charge at least six Russian government officials involved in the DNC hack during the 2016 Presidential election. In the past months, US intelligence b
Publish At:2017-11-05 16:20 | Read:239 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence DNC hack Ru

Hackers poisoned Google Search results to spread Zeus Panda banking Trojan

Experts at Cisco Talos observed crooks exploiting black Search Engine Optimization (SEO) to spread the Zeus Panda banking Trojan. Threat actors behind the Zeus Panda banking Trojan leveraged black Search Engine Optimization (SEO) to propose malicious links in the search results. Crooks were focused on financial-related keyword queries. The campaign was first
Publish At:2017-11-05 16:20 | Read:396 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Black Seo Cybercri

Fake WhatsApp app in official Google Play Store downloaded by over a million Android users

A fake WhatsApp version deployed on the Play Store was downloaded by over a million users, a failure for the automated checks implemented by Google. Once again crooks exploited the official Google’s Play Store as a repository for malicious apps. This time a fake WhatsApp version was used to infect over a million users that downloaded it. The fake Whats
Publish At:2017-11-05 16:20 | Read:300 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile

Tor Project fixed TorMoil, a critical Tor Browser flaw that can leak users IP Address

The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must update their Tor browser to fix a critical vulnerability, dubbed TorMoil, that could leak their real IP addresses to potential attackers when they visit websites with certain content. The Tor Project released the Tor Br
Publish At:2017-11-05 16:20 | Read:230 | Comments:0 | Tags:Breaking News Hacking anonymity encryption Tor Tor Project T

Hacker threatens Canadian University to dump student info unless the university pay a ransom

A hacker is attempting to extort the Canadian University of Fraser Valley (UFV), threatening to dump student information unless the university pays a ransom. Extortion is a winning criminal model for crooks, a hacker is attempting to extort the Canadian University of Fraser Valley (UFV), threatening to dump student information unless the university pay 30,00
Publish At:2017-11-05 16:20 | Read:321 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Canadian University Cyberc

Flaws in IEEE P1735 electronics standard expose intellectual property

Experts discovered flaws in IEEE P1735 electronics standard, which describes methods for encrypting electronic-design intellectual property (IP). Crypto flaws in the IEEE P1735 electronics standard expose highly-valuable intellectual property in plaintext. The IEEE P1735 electronics standard provides recommendations on methods and techniques for encrypting e
Publish At:2017-11-05 16:20 | Read:643 | Comments:0 | Tags:Breaking News Hacking Security IEEE P1735 electronics standa

Security Affairs newsletter Round 135 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again thank you! IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsats SATCOM systems Matrix Ransomware being distributed through malvertising Security Affairs newsletter Round 134 – News of the week Hash
Publish At:2017-11-05 16:20 | Read:324 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud