HackDig : Dig high-quality web security articles for hacker

Company fired an employee, he shut down water utility providers’ networks in 5 cities

A former employee was sentenced to one year and one day in prison for damaging the IT networks of several water utility providers across the US East Coast. Adam Flanagan (42) of Bala Cynwyd, PA was sentenced to one year and one day in prison by a Pennsylvania court for damaging the IT networks of several water utility providers across the US East Coast. The
Publish At:2017-06-26 08:45 | Read:93 | Comments:0 | Tags:Breaking News Cyber Crime Hacking insider TGB water utility

UK Parliament shut down external access to email accounts after cyberattack

The UK Parliament has suffered the biggest ever cyber attack against the email systems, it shut down external access to mitigate the threat. The UK Parliament has shut down external access to e-mail accounts on Saturday after a cyberattack. According to the authorities, the attack was “sustained and determined,” hackers launched a prolonged brute
Publish At:2017-06-25 14:20 | Read:64 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence dara breach

32TB of Windows 10 internal builds and portions of core source code leaked online

A massive dump of Microsoft’s confidential Windows 10 internal builds, and the source codes for private software has been leaked online. A huge trove of Microsoft internal Windows operating system builds and portions of core source code have leaked online. The news was first reported by The Register, the 32TB of official and non-public installation ima
Publish At:2017-06-24 19:56 | Read:128 | Comments:0 | Tags:Breaking News Data Breach Hacking data breach data leak Micr

Stealing AES-256 keys in seconds using €200 of off-the-shelf components

Security experts at Fox‑IT have demonstrated that is possible sniff AES-256 encryption keys from a distance of one meter (3.3 feet) with a cheap equipment. Security experts at Fox‑IT have demonstrated that is possible to power a side-channel attack to wirelessly extract secret AES-256 encryption keys from a distance of one meter (3.3 feet). The researchers u
Publish At:2017-06-24 19:56 | Read:92 | Comments:0 | Tags:Breaking News Hacking AES-256 encryption Pierluigi Paganini

US intelligence claims Russian hackers probed electoral networks in 21 US states

According to the US intelligence, Russian hackers tried to compromise electoral networks in 21 unnamed US states, but voting tallies hadn’t been hacked. According to Homeland Security officials, the attack against the 2016 Presidential election was more sophisticated than first thought. In a public hearing into the Russian interference in the 2016 Pres
Publish At:2017-06-24 19:56 | Read:122 | Comments:0 | Tags:Breaking News Cyber warfare Hacking electoral networks Pierl

Experts devised the GhostHook Attack technique to bypass Windows 10 PatchGuard Protections

Experts have devised the GhostHook Attack technique to install rootkits on machines running the Windows 10 operating system. Security flaws in Microsoft PatchGuard kernel protection could be exploited by attackers to install rootkits on machines running the secure Windows 10 operating system. The PatchGuard, also known as Kernel Patch Protection, is a softwa
Publish At:2017-06-24 01:30 | Read:204 | Comments:0 | Tags:Breaking News Hacking GhostHook attack PatchGuard Windows 10

UK politicians’ login credentials up for sale in the dark web

Russians hackers are offering for sale on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. According to The Times, Russians hackers are selling on the dark web login credentials of thousands of top UK politicians, top officials, and diplomats. Journalists at the British newspaper have found two huge lists of st
Publish At:2017-06-24 01:30 | Read:212 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Deep Web dara breach D

Brutal Kangaroo is the CIA tool suite for hacking Air-Gapped Networks

WikiLeaks has published a new batch of Wikileaks documents that detail the Brutal Kangaroo tool suite for hacking Air-Gapped Networks. WikiLeaks has published a new batch of documents belonging to the Vault 7 leak, the last archive includes the documentation related to a tool dubbed Brutal Kangaroo used by the CIA for Microsoft Windows that targets air-gappe
Publish At:2017-06-23 07:05 | Read:148 | Comments:0 | Tags:Breaking News Hacking Intelligence Brutal Kangaroo Vault7

Drupal fixes the CVE-2017-6922 flaw exploited in spam campaigns in the wild

Drupal team released security updates to fix several vulnerabilities, including the critical access bypass flaw CVE-2017-6922 exploited in spam campaigns. The Drupal development team has released security updates to fix several vulnerabilities, including the critical access bypass flaw tracked as CVE-2017-6922 that has been exploited in spam campaigns. The C
Publish At:2017-06-23 07:05 | Read:114 | Comments:0 | Tags:Breaking News Hacking CMS CVE-2017-6922 Cybercrime Drupal Pi

OpenVPN fixed several remotely exploitable flaws that were not detected by recent audits

OpenVPN fixed several vulnerabilities that could be exploited by remote attackers, the flaws were not detected in a recent audit. Recently two distinct audits were conducted to discover security issues in the OpenVPN, many flaws were found but some vulnerabilities were not spotted by the experts. Four of the vulnerabilities in OpenVPN 2.4.2, were found by th
Publish At:2017-06-23 07:05 | Read:155 | Comments:0 | Tags:Breaking News Hacking OpenVPN RCE exploit

Attackers can exploit electronic cigarettes to hack computers

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In November 2014, in a discussion started on the Reddit news media website it has been debated the case of a malware implanted by using electronic cigarettes connected over USB. Hackers are able to exploit any electronic device to del
Publish At:2017-06-22 12:40 | Read:128 | Comments:0 | Tags:Breaking News Hacking charger electronic cigarettes malware

Ew! Skuzzy CTF Walkthrough

In my last article, we exploited a vulnerable machine from the vulnhub.com. That article must have given you some idea about hacking a machine without having much knowledge about it. In this article, we will complete another CTF named “Ew! Skuzzy” from vulnhub.com. As per the description given by the author on the VulnHub.com, the difficult
Publish At:2017-06-21 16:45 | Read:153 | Comments:0 | Tags:Hacking

Two Ztorg Trojans Removed from Google Play Store Are Definitely Better

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that could allow attackers to root targeted devices. Most software developers update their apps to patch vulnerabilities and add new features. But when the software is malware, an update could be the worst thing to do. The Google Play Store is always working to prev
Publish At:2017-06-20 23:50 | Read:178 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Mobile Android Cyb

Stack Clash vulnerability allows an attacker to execute code as root

Stack Clash is a local privilege escalation flaw in Linux, BSD, Solaris and other open source systems that allows an attacker to execute code as root. Linux, BSD, Solaris and other open source systems are vulnerable to a local privilege escalation vulnerability known as Stack Clash that allows an attacker to execute code as root. Stack Clash is a local privi
Publish At:2017-06-20 05:25 | Read:148 | Comments:0 | Tags:Breaking News Hacking BSD LINUX Solaris Stack Clash Vulnerab

Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software

Journalists and activists in Mexico accused the government of spying on them with the powerful surveillance software Pegasus developed by the NSO Group. Journalists and activists in Mexico accused the government of spying on them with a powerful surveillance software. According to the journalists, the authorities used an Israeli spyware to hack their mobile
Publish At:2017-06-20 05:25 | Read:157 | Comments:0 | Tags:Breaking News Digital ID Hacking Hacktivism Malware Mobile M

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud