Hackers

Retour à Sécurité

Security Affairs

    • 15 juin 2021Fujifilm restores operations after recent ransomware attack
      Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese multinational conglomerate Fujifilm announced that it was hit by a ransomware attack and shut down its network in response to the incident. Around two weeks later the Japanese giant announced that it has restored operations following the attack. Fuj …

    • 15 juin 2021The source code of the Paradise Ransomware was leaked on XSS hacking forum
      The source code for the Paradise Ransomware has been released on a hacking forum allowing threat actors to develop their customized variant. The source code for the Paradise Ransomware has been released on the hacking forum XSS allowing threat actors to develop their own customized ransomware operation. The news of the availability of the source code was first reported by Tom Malka, a senior threa …

    • 15 juin 2021Former NSA contractor Reality Winner who leaked gov report will be released on November
      Reality Winner, a former NSA contractor who leaked classified documents to the press in 2017, has been released from prison to home confinement. Reality Winner is a former NSA intelligence contractor who leaked a classified hacking report to the press in 2017. The FBI arrested Reality Leigh Winner on 3rd June for leaking classified information to The Intercept that published the Top-Secret NSA rep …

    • 15 juin 2021Instagram flaw allowed to see private, archived Posts/Stories of users without following them
      Instagram has addressed a new flaw that allowed anyone to access private accounts viewing archived posts and stories without having to follow them. Researcher Mayur Fartade has found a vulnerability in Instagram that allowed anyone to access private accounts, viewing archived posts and stories without having to follow them. The expert reported the flaw to the Facebook’s security team on Apri …

    • 15 juin 2021Wear your MASQ! New Device Fingerprint Spoofing Tool Available in Dark Web
      The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The Resecurity® HUNTER unit has identified a new tool available for sale in the Dark Web called MASQ, enabling bad actors to emulate device fingerprints thus allowing them to bypass fraud protection controls, including authentication mechanisms. One of the prominent new fe …

    • 15 juin 2021REvil ransomware gang hit US nuclear weapons contractor Sol Oriens
      The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was hit by a cyberattack carried out by the REvil ransomware operators, which claims to have stolen data. Sol Orien provides consultant services to the National Nuclear Security Administration (NNSA), it confirmed …

    • 14 juin 2021Apple fixed 2 WebKit flaws exploited to target older iPhones
      Apple released an out-of-band iOS update for older iPhones and iPads and warned that threat actors are actively exploiting two flaws in WebKit. Apple released an out-of-band iOS update ( iOS 12.5.4 patch) for older iPhones and iPad, the IT giant also warned that some vulnerabilities affecting its WebKit may have been actively exploited. WebKit is a browser engine developed by Apple and primarily u …

    • 14 juin 2021Microsoft experts disrupted a large-scale BEC campaign
      Microsoft disrupted a large-scale business email compromise (BEC) campaign that used forwarding rules to access messages related to financial transactions. Microsoft researchers announced to have disrupted the cloud-based infrastructure used by crooks in a recent large-scale business email compromise (BEC) campaign. The attackers breached the mailboxes of the victims using phishing messages, then …

    • 14 juin 2021SEO poisoning campaign aims at delivering RAT, Microsoft warns
      Microsoft spotted a series of attacks that use SEO poisoning to deliver a remote access trojan (RAT) used by threat actors to steal sensitive data. Microsoft is monitoring a wave of cyber attacks that leverages SEO poisoning to deliver a remote access trojan (RAT) to steal sensitive data from the infected systems Microsoft 365 Defender data shows that the SEO poisoning technique is effective, give …

    • 14 juin 2021G7 calls on Russia to dismantle operations of ransomware gangs within its borders
      The member states of the G7 group have called on Russia and other states to dismantle operations of the ransomware gangs operating within their countries. G7 member states have called on Russia and other states to dismantle operations of ransomware gangs operating within their countries. The call to action follows the large number of ransomware attacks that targeted organizations in the US and Eur …

The Hackers News

    • 15 juin 2021Experts Shed Light On Distinctive Tactics Used by Hades Ransomware
      Cybersecurity researchers on Tuesday disclosed « distinctive » tactics, techniques, and procedures (TTPs) adopted by operators of Hades ransomware that set it apart from the rest of the pack, attributing it to a financially motivated threat group called GOLD WINTER. « In many ways, the GOLD WINTER threat group is a typical post-intrusion ransomware threat group that pursues high-value targets to …

    • 15 juin 2021Instagram‌ ‌Bug Allowed Anyone to View Private Accounts Without Following Them
      Instagram has patched a new flaw that allowed anyone to view archived posts and stories posted by private accounts without having to follow them. « This bug could have allowed a malicious user to view targeted media on Instagram, » Mayur Fartade said in a Medium post today. « An attacker could have been able to see details of private/archived posts, stories, reels, IGTV without following the user …

    • 15 juin 2021Apple Issues Urgent Patches for 2 Zero-Day Flaws Exploited in the Wild
      Apple on Monday shipped out-of-band security patches to address two zero-day vulnerabilities in iOS 12.5.3 that it says are being actively exploited in the wild. <!–adsense–> The latest update, iOS 12.5.4, comes with fixes for three security bugs, including a memory corruption issue in ASN.1 decoder (CVE-2021-30737) and two flaws concerning its WebKit browser engine that could be abused to …

    • 14 juin 2021Google Workspace Now Offers Client-side Encryption For Drive and Docs
      Google on Monday announced that it’s rolling out client-side encryption to Google Workspace (formerly G Suite), thereby giving its enterprise customers direct control of encryption keys and the identity service they choose to access those keys. « With client-side encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google’s native web-based …

    • 14 juin 2021NoxPlayer Supply-Chain Attack is Likely the Work of Gelsemium Hackers
      A new cyber espionage group named Gelsemium has been linked to a supply chain attack targeting the NoxPlayer Android emulator that was disclosed earlier this year. The findings come from a systematic analysis of multiple campaigns undertaken by the APT crew, with evidence of the earliest attack dating back all the way to 2014 under the codename Operation TooHash based on malware payloads …

    • 14 juin 2021Cybersecurity Executive Order 2021: What It Means for Cloud and SaaS Security
      In response to malicious actors targeting US federal IT systems and their supply chain, the President released the « Executive Order on Improving the Nation’s Cybersecurity (Executive Order). » Although directed at Federal departments and agencies, the Executive Order will likely have a ripple effect through the Federal technology supply stream. Private companies and enterprises will look to the …

    • 15 juin 2021Chinese Hackers Believed to be Behind Second Cyberattack on Air India
      Even as a massive data breach affecting Air India came to light the previous month, India’s flag carrier airline appears to have suffered a separate cyber assault that lasted for a period of at least two months and 26 days, new research has revealed, which attributed the incident with moderate confidence to a Chinese nation-state threat actor called APT41. Group-IB dubbed the campaign « ColunmTK » …

    • 14 juin 2021Mozilla Says Google's New Ad Tech—FLoC—Doesn't Protect User Privacy
      Google’s upcoming plans to replace third-party cookies with a less invasive ad targeted mechanism have a number of issues that could defeat its privacy objectives and allow for significant linkability of user behavior, possibly even identifying individual users. « FLoC is premised on a compelling idea: enable ad targeting without exposing users to risk, » said Eric Rescorla, author of TLS standard …

    • 14 juin 2021Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users
      Multiple critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited, could have allowed adversaries access to personal data without users’ consent and take control of the devices.  « The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, calls, SMS/MMS, install arbitrary apps with device …

    • 11 juin 2021Live Cybersecurity Webinar — Deconstructing Cobalt Strike
      Organizations’ cybersecurity capabilities have improved over the past decade, mostly out of necessity. As their defenses get better, so do the methods, tactics, and techniques malicious actors devise to penetrate their environments. Instead of the standard virus or trojan, attackers today will deploy a variety of tools and methods to infiltrate an organization’s environment and attack it from …

Dark Reading

WeLiveSecurity

Threatpost

E Hacking News | Latest Hacker News and IT Security News

    • 15 juin 2021The US has linked major cyber attacks against Russia with Chinese hackers
       Solar JSOC spoke about a series of cyber attacks on Russian government systems in 2020. According to the American Company Sentinel Labs, the ThunderCats group, which is associated with China, is behind the attacksSentinel Labs, an American cybersecurity company, said that China is involved in a series of targeted hacker attacks on Russian government systems in 2020.The report was prepared on …

    • 15 juin 2021SIP Protocol Exploited to Trigger XSS Attacks via VoIP Call Monitoring Software
       According to new research, the SIP communications protocol can be exploited to conduct cross-site scripting (XSS) assaults. In a blog post published on June 10, the Session Initiation Protocol (SIP), the technology used to manage communication across services such as Voice over IP (VoIP), audio, and instant messaging, can be used as a conduit to perform app-based assaults on software, a …

    • 15 juin 2021 Three Unpatched Bugs Spotted in Third-Party Provisioning Platform
       Researchers at Rapid7 have unearthed three highly critical security flaws in Akkadian Provisioning Manager, a third-party provisioning tool within Cisco Unified Communications environments that can be chained together to enable remote code execution (RCE) with elevated privileges.Cisco’s UC suite allows VoIP and online video communications across enterprise footprints. The Akkadian products …

    • 15 juin 2021341% Surge in DDoS Attacks During the Epidemic
       The epidemic resulted in a 341 percent spike year-over-year in distributed denial of services (DDoS) attacks as per Nexusguard’s Annual Threat Report 2020, which is targeting sectors that provided connection, services, and entertainment to populated populations that were compelled for shelter. The enormous change in online behavior and dependence on connectivity has stretched communicat …

    • 15 juin 2021Facebook Messenger Rooms Exploit Bypasses Android Screen Lock Protection
       As a result of a security flaw in Facebook’s Messenger Rooms video chat function, attackers are able to gain access to a victim’s private Facebook photographs and videos, as well as submit posts, from their locked Android screen. Messenger Rooms, Facebook’s newest video conferencing service, allows up to 50 individuals to video chat at the same time. You can converse for as long as you want, …

TechWorm

    • 27 avril 2021Emotet Malware Destroys Itself From Infected PCs Around The World
      European law enforcement on Sunday used a customized Windows Dynamic Link Library (DLL) to automatically wipe off Windows malware Emotet from thousands of infected computers. For those unaware, Emotet, one of the world’s most infamous botnets, is a network of hijacked computers and devices infected with malware and controlled remotely by cybercriminals. This network is then used to send spam and l …

    • 25 avril 2021Apple Hit In A $50 Million Ransomware Hack Attack
      Apple has been targeted in a $50 million ransomware attack following the theft of a sizeable amount of schematics related to manufacturing and engineering of current and future products from Quanta, a Taiwan-based company that serves as one of Apple’s suppliers for MacBooks and other products. The leak, first reported by The Record, was carried out by REvil, a Russian hacking group also known as S …

    • 3 avril 2021Hackers Setup Fake Cyber Security Firm To Target Security Researchers
      Google’s Threat Analysis Group (TAG), a Google security team specialized in hunting advanced persistent threat (APT) groups, on Wednesday shared that a North Korean government-backed campaign is targeting cybersecurity researchers with malware via social media. For those unaware, in January 2021, TAG had disclosed a hacking campaign, targeting security researchers working on vulnerability research …

    • 9 février 2021Hacker Increased Chemical Level In Florida City’s Water System
      Hackers on Friday gained unauthorized entry into the computer system controlling a water treatment facility in the city of Oldsmar, Florida and sought to add a “dangerous level” of additive to the water supply, according to a report from the Tampa Bay Times.   The incident first took place on February 5th at Oldsmar’s water treatment facility when around 8 a.m. a plant operator noticed someone rem …

    • 22 octobre 2020Mysterious ‘Robin Hood’ Hackers Donate Stolen Money To Charities
      A mysterious hacker group by the name ‘Darkside’ has donated stolen bitcoin money to two charitable organizations.  The hackers who claim to have extorted millions of dollars from large profitable corporations via a ransomware attack said in a post on the dark web that they want to “make the world a better place”. In their dark web post, the Darkside hacker group posted two receipts of …

GBHackers On Security

    • 15 juin 2021Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
      Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting in the target web Application which is given for Penetration Testing. Repeatable Testing and Conduct a serious method One of the [ …

    • 15 juin 2021BackdoorDiplomacy APT Group Attacks Telecommunications & Organizations Worldwide
      The cybersecurity research team of ESET has recently identified a very new APT group named as BackdoorDiplomacy, attacking telecommunications and diplomatic organizations throughout the world. According to the report, this group has attacked the Ministries of Foreign Affairs of several countries for the past four years in the Middle East and Africa. The researchers of […] The post BackdoorDi …

    • 14 juin 2021Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online
      is this website safe ? In this digital world, Check website safety is most important concern since there are countless malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and need to make sure the site is not dangerous by using Multiple approaches. In general, […] The post Is this website Safe : How …

    • 13 juin 2021What is the Future of Cybersecurity? Depth Cyber Space Analysis
      Security has become part of a standard product offering. In the last few years, it has changed the landscape. Cloud providers are now offering a lot of security that was previously only available from third parties. There are sites like Vpnetic.com offering detailed information on the secrets of cybersecurity. Technology can create a level of […] The post What is the Future of Cybersecurity? …

Cyber Defense Magazine

    • 13 juin 2021Uncovering hidden cybersecurity risks
      By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical […] The post Uncovering hidden cybersecurity risks appeared first on Cyber Defense Magazine. …

    • 11 juin 2021A Digital Journey: A Long and Winding Road
      How did we build the internet and not secure it? By David Jemmett, CEO and Founder, Cerberus Sentinel […] The post A Digital Journey: A Long and Winding Road appeared first on Cyber Defense Magazine. …

    • 10 juin 2021Crypto-mining campaign targets Kubeflow installs on a large scale
      Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. […] The post Crypto-mining campaign targets Kubeflow installs on a large scale appeared first on Cyber Defense Magazine. …

    • 10 juin 2021Data Loss Prevention in Turbulent Times
      By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This […] The post Data Loss Prevention in Turbulent Times appeared first on Cyber Defense Magazine. …

blackMORE Ops

    • 22 avril 2021Can’t connect to WiFi in Linux
      So I installed the latest version of Kali Linux from USB into my RAZER Blade 2016 laptop. Took a while as it seems after 5 years on non-stop use and abuse, this laptop is finally slowing down. Oh yes, touchpad was disabled the whole time I was installing but keyboard was just fine. After finishing … The post Can’t connect to WiFi in Linux appeared first on blackMORE Ops. …

    • 18 novembre 2020How to install the noip2 on Ubuntu and run via systemd systemctl (noIP Dynamic Update Client)
      This post attempts to fix that problem by installing required packages to run the make command, install noip2 binary, fix file permissions if missing, create an init.d script for service command, create a systemd file so that we can control it via systemd and finally enable it via systemctl. The post How to install the noip2 on Ubuntu and run via systemd systemctl (noIP Dynamic Update Client) appe …

    • 23 avril 2020Accessing ESXi console screen from an SSH session
      I’ve had this issue many times where Firewall ports to iDrac, iLo or RSA were not open and I couldn’t access VMWare ESXi host’s setup screen (the yellow screen!) to change configuration or even restart it. In every cases, I had SSH access to the ESXi host but then I just couldn’t remember what command … The post Accessing ESXi console screen from an SSH session appear …

    • 23 avril 2020Accessing the RAID setup on an HP Proliant DL380 G7
      When the HP Proliant DL380 G7 boots up the only displayed BIOS options are F9 for Setup, F11 for the boot disk menu, but neither other these take you to the RAID setup. To get to the RAID setup options, when the screen appears showing the F9 and F11 options press F8 every second or … The post Accessing the RAID setup on an HP Proliant DL380 G7 appeared first on blackMORE Ops. …

    • 7 octobre 2019Change IP address in packet capture file (faking IP)
      I’m sure you bumped into situations where you needed to fake IP address in a capture file. This maybe required when you’re trying to send the capture file to someone that you don’t really share your real IP’s with or you just want to change cause you can. If you’ve tried this and looked around the interwebs, you’d surely know that there’s not many guides available and most people would just tell c …

Hacker Ritz

    • 11 janvier 2019New Wifi Hack Method, Easy and Workable on WPA/WPA2 Securities.
      Looking for how to hack WiFi password OR WiFi hacking software?Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers.Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens ‘Atom’ Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols wit …

    • 7 janvier 2019Bitcoin And Cryptocurrency Litigation : A Game Of Future
      Bitcoin and other cryptocurrencies are gaining more attention as days pass. Aside from the advantages that cryptocurrencies have like anonymity and easy international transactions, people are enticed by the fact that it can become a good investment. Apart from trading bitcoins for cash, you can also use bitcoins to buy gift cards, book flights, and hotels, buy furnitu …

    • 20 novembre 2018 Facebook Bug Could Have Exposed Your Private Information
      Another security vulnerability has been reported in Facebook that could have allowed attackers to obtain certain personal information about users and their friends, potentially putting the privacy of users of the world’s most popular social network at risk.Discovered by cybersecurity researchers from Imperva, the vulnerability resides in the way Facebook search feature displays results for entered …

    • 20 novembre 2018Instagram Bug : Passwords are in Plain Text
      Instagram has recently patched a security issue in its website that might have accidentally exposed some of its users’ passwords in plain text.The company recently started notifying affected users of a security bug that resides in a newly offered feature called « Download Your Data » that allows users to download a copy of their data shared on the social media platform, including photos, comments, p …

    • 19 mai 2018Inside one of the largest hacking conferences in Russia
      Inside one of the largest hacking conferences in RussiaABC NewsWATCHHackers put their skills on display in Moscow conferenceEmailHundreds of aspiring hackers in Moscow faced off against one another earliest this week in different challenges.The event, called Positive Hack Days, is organized by the cybersecurity firm Positive Technologies. More than 4,000 people attended the cybersecurity conferenc …