HackDig : Dig high-quality web security articles for hacker

Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket

Security researchers discovered that hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security experts continue to discover unsecured AWS storage bucket leaking sensitive data. Last discovery in order of time is an AWS storage related to the hotel booking service Groupize, it was discovered by Kromtech
Publish At:2017-08-23 05:05 | Read:72 | Comments:0 | Tags:Breaking News Data Breach Amazon AWS data leak Groupize Maci

USS John S McCain incident, some experts speculate it was a cyber attack

On Monday, the USS John S McCain collided a Liberian-flagged tanker near Singapore, some experts speculate the incident was caused by a cyber attack. On Monday, the USS John S McCain collided a Liberian-flagged tanker near Singapore. The incident had serious consequences on the US operation, the Chief of Naval Operations Adm. John Richardson ordered a pause,
Publish At:2017-08-23 05:05 | Read:116 | Comments:0 | Tags:Breaking News Cyber warfare cyber warfare GPS spoofing US Na

Neptune exploit kit used to deliver Monero cryptocurrency miners via malvertising

According to a new report published by FireEye, crooks have been using the Neptune exploit kit to deliver cryptocurrency miners via malvertising campaigns. According to experts at FireEye, crooks are exploiting the Neptune exploit kit (aka Terror EK, Eris, and Blaze) to delivery cryptocurrency miners via malvertising campaigns. The Neptune exploit kit was fi
Publish At:2017-08-23 05:05 | Read:132 | Comments:0 | Tags:Breaking News Cyber Crime Malware Andromeda Cybercrime malwa

Ourmine hacked PlayStation Social Media Accounts to announce the theft of PSN Database

Ourmine hacker crew hijacked the official Twitter and Facebook accounts for Sony PlayStation Network (PSN) on Sunday and claims to have stolen PSN database. The dreaded Ourmine hacker crew is back, after the recent hack of social media accounts of HBO and Game of Thrones, the team hijacked the official Twitter and Facebook accounts for Sony PlayStation Netw
Publish At:2017-08-22 13:35 | Read:127 | Comments:0 | Tags:Breaking News Hacking data breach Ourmine PlayStation PSN

Experts at ZDI reported two critical Zero-Day flaws in Foxit PDF Reader

Experts found two critical zero-day flaws in the Foxit PDF Reader that could be exploited by attackers to execute arbitrary code on a targeted computer Security researchers have discovered two critical zero-day vulnerabilities in the popular Foxit Reader application that could be exploited by attackers to execute arbitrary code on a targeted computer, if no
Publish At:2017-08-22 13:35 | Read:144 | Comments:0 | Tags:Breaking News Hacking Foxit PDF Reader RCE ZDI zero-Day

Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread

A new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread. A new strain of Cryptocurrency Miner dubbed CoinMiner appeared in the wild and according to the experts it is hard to detect and infects Windows PCs via EternalBlue NSA exploit. CoinMiner is a fileless malware that leverages the WMI (Windows Ma
Publish At:2017-08-22 13:35 | Read:103 | Comments:0 | Tags:Breaking News Cyber Crime Malware CoinMiner Cybercrime ETERN

SyncCrypt Ransomware hides its components in image files

A new strain of ransomware distributed through spam emails, dubbed SyncCrypt, hides its components inside harmless-looking images. A new strain of ransomware recently discovered, dubbed SyncCrypt, hides its components inside harmless-looking images. The SyncCrypt ransomware is distributed through spam emails that use attachments containing WSF files pretendi
Publish At:2017-08-21 16:10 | Read:109 | Comments:0 | Tags:Breaking News Malware malware ransomware SyncCrypt Ransomwar

New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and supporting drone missions A news batch of documents leaked by former NSA contractor Edward Snowden has revealed a United States facility located in Australia’s Northern Territory for covertly monitoring wireless communication
Publish At:2017-08-21 16:10 | Read:139 | Comments:0 | Tags:Breaking News Intelligence Drone Edward Snowden Hacking Join

Enigma platform hacked, hackers stole over $470,000 worth of Ethereum

Enigma platform hacked – Another cyber heist made the headlines, this time an unknown hacker has stolen more than $471,000 worth of Ethereum cryptocurrency. The hacker has stolen it from the cryptocurrency investment platform, Enigma. According to an announcement made on Enigma website, an “unknown entity” has hacked their website, slack a
Publish At:2017-08-21 16:10 | Read:105 | Comments:0 | Tags:Breaking News Cyber Crime Hacking cyber heist Cybercrime Eth

Mr.Smith, HBO hackers threaten to leak final episode of Game of Thrones 7

The bad actors behind the HBO hack are back and are threatening to leak the final episode of the seventh season of Game of Thrones. The threat actor that has hacked into the HBO announced that it will leak the final episode of Game of Thrones season 7.The hacker who claimed the responsibility for the hack called himself Mr. Smith, he told Mashable media outl
Publish At:2017-08-21 16:10 | Read:169 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Cybercrime data breach

Security Affairs newsletter Round 124 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. ·      Anti-Israel and pro-Palestinian IsraBye wiper spreads as a ransomware ·      Kenya opposition claims election results manipulated in cyber attack ·      MUGHTHESEC, a signed Mac adware that hijacks the victims browser for profit ·   
Publish At:2017-08-20 21:45 | Read:82 | Comments:0 | Tags:Breaking News cyber security Newsletter Pierluigi Paganini S

Learning About ISIS Intentions Using Open Source Intelligence

Learning About ISIS Intentions Using Open Source Intelligence – How terrorists are exploiting technology for propaganda and radicalization. ISIS’ weekly newsletter al-Nabā’ published an editorial about the lessons to be learned from the attack on the Iraqi embassy in Kabul, Afghanistan (July 30, 2017), which it called “an action of h
Publish At:2017-08-20 06:05 | Read:92 | Comments:0 | Tags:Breaking News Terrorism Barcelona terrorist attack Dark Web

Turla APT group adapts KopiLuwak backdoor for use in G20-themed attack

Security experts at Proofpoint have collected evidence that suggests that the Turla APT group is conducting a new espionage campaign. The experts discovered a newly dropper for the KopiLuwak backdoor, KopiLuwak is a JavaScript malware that was spotted early this year while the APT was delivering it to at least one victim leveraging a document containing an
Publish At:2017-08-20 03:20 | Read:101 | Comments:0 | Tags:APT Breaking News Cyber warfare cyber espionage Hacking Info

Barcelona terrorist attack – Extremism, A Sea Change In Tactics

Analysts at Global Intelligence Insight analyzed the recent Barcelona terrorist attack linking it to the content shared recently in the Jihadist community. Another terrorist attack took place in a European city, this time in Barcelona; just south of the city in the tourist resort of Cambrils a number of potential suicide bombers have been shot dead; the Span
Publish At:2017-08-20 03:20 | Read:133 | Comments:0 | Tags:Breaking News Intelligence Terrorism Barcelona terrorist att

Hackers can completely hijack a mobile device via replacement of a touchscreen

Hackers can hijack mobile devices by hiding malicious chips in a touchscreen and other components that are replaced. According to a team of researchers at the Ben-Gurion University of the Negev, this technique can give hackers complete control over the device. “Phone touchscreens, and other similar hardware components such as orientation sensors, wirel
Publish At:2017-08-20 03:20 | Read:133 | Comments:0 | Tags:Breaking News Hacking chip-in-the-middle attack supply chain

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud