Posts

Showing posts from October, 2018

Canadian Crypto Exchange MapleChange Got Hacked – People Suspect An Exit Scam

Once again, a crypto exchange allegedly suffered a major cyber attack losing millions of dollars. This time, the victim is Canadian Crypto Exchange MapleChange Got Hacked – People Suspect An Exit Scam on Latest Hacking News . from Latest Hacking News https://ift.tt/2CSfDEJ

Moscow court issued an arrest warrant for the co-founder of hacker group "Humpty Dumpty"

Image
Let's reminder that the process of the scandalous case of the hacker group "Humpty Dumpty" has been going on for several years. The investigation found that hackers broke into the mailboxes of officials and businessmen and then extorted money from them for non-proliferation of data. This week the Court of Moscow arrested in absentia and declared in the international search of one of the founders of the hacker group "Humpty Dumpty" Alexander Glazastikow. According to Media reports, the man left Russia and is in the Baltic States, or rather in Estonia, where he sought asylum. In August 2018, another founder of "Humpty Dumpty" Vladimir Anikeev was released. The court sentenced him to two years in prison, but half of the term Anikeev served in the pre-trial detention centre. An interesting fact is that the Press Secretary of the Prime Minister Dmitry Medvedev Natalia Timakova probably became one of the victims of the group. Anikeev said that t...

Telegram's 'secret chat' feature stores conversations in plain text

Bank Islami Cyber Attack Marks The Biggest In History for Pakistan

The banking sector has always been a target of hackers worldwide. This time they have targeted Pakistan. The victim Bank Bank Islami Cyber Attack Marks The Biggest In History for Pakistan on Latest Hacking News . from Latest Hacking News https://ift.tt/2zcnklC

Latest Hacking News Podcast #153

GPlayed Banking Trojan discovered, an employee infects US Govt system after browsing 9,000 porn pages and Apple's T2 prevents eavesdropping through the microphone on episode 153 of our daily podcast. Latest Hacking News Podcast #153 on Latest Hacking News . from Latest Hacking News https://ift.tt/2SAvUDA

Windows 10 Bug Allowed UWP Apps Full Access to User's Files

ch4inrulz: 1.0.1 | Vulnhub Hacking Challenge Walkthrough

ch4inrulz: 1.0.1 is an intermediate level CTF machine available at Vulnhub. The box was developed by ASKAR and released on ch4inrulz: 1.0.1 | Vulnhub Hacking Challenge Walkthrough on Latest Hacking News . from Latest Hacking News https://ift.tt/2yGmXAi

Numerous Gabon Government Websites Hacked By Anonymous Hackers Group

Recently, we heard of a massive hacking attack in Gabon (West Africa). As revealed, hackers from Anonymous claimed responsibility having Numerous Gabon Government Websites Hacked By Anonymous Hackers Group on Latest Hacking News . from Latest Hacking News https://ift.tt/2yHBuM9

Microsoft shared details of Indian bank customers’ with US intelligence agencies

Image
Microsoft consistently shared the financial data of Indian bank customers with the intelligence agencies in the United States, revealed an exclusive report by DNA Money. According to the report, the Reserve Bank of India has expressed its concerns over the matter in a risk assessment report tabled before the banks’ audit committees.  The data which was shared with the US agencies are of the customer's running an account with banks that have migrated to Microsoft Office 365 cloud-based email service. “All the mailboxes had been migrated to office 365 Microsoft cloud environment. It was gathered from the Microsoft transparency hub that Microsoft is bound to share customers’ data under US Foreign Intelligence Surveillance Act (FISA) and US national security letters as and when required by the US authorities,” RBI official as quoted by DNA money. However, the twist is that the Indian banks know about this data sharing, only the customers were unaware of any kind of inform...

Recon-ng – Open Source Intelligence (OSINT) Reconnaissance Framework

Recon-ng is a reconnaissance framework that can perform open source web based information gathering for a given target. Recon-ng is Recon-ng – Open Source Intelligence (OSINT) Reconnaissance Framework on Latest Hacking News . from Latest Hacking News https://ift.tt/2OXtaC9

The Ultimate Plumber- A Tool For Writing Linux Pipes in A Terminal-Based UI

Image
The Ultimate Plumber- A Tool For Writing Linux Pipes in A Terminal-Based UI UP is the Ultimate Plumber, a tool for writing Linux pipes in a terminal-based UI interactively, with instant live preview of command results. The main goal of the Ultimate Plumber is to help interactively and incrementally explore textual data in Linux, by making it easier to quickly build complex pipelines, thanks to a fast feedback loop. This is achieved by boosting any typical Linux text-processing utils such as grep, sort, cut, paste, awk, wc, perl, etc.,  by providing a quick, interactive, scrollable preview of their results. Usage Download UP for Linux   |    Other OSes To start using up, redirect any text-emitting command (or pipeline) into it — for example: $ lshw |& ./up then: use PgUp/PgDn and Ctrl-[←]/Ctrl-[→] for basic browsing through the command output; in the input box at the top of the screen, start writing any bash pipeline; then press Enter t...

EaseUS Data Recovery Wizard Review

Take a look at a modern, digital camera today, and you’ll probably find it uses an SD card in order EaseUS Data Recovery Wizard Review on Latest Hacking News . from Latest Hacking News https://ift.tt/2zgzfyO

Sn1per- Automated Pentest Framework For Offensive Security Experts

Image
Sn1per- Automated Pentest Framework For Offensive Security Experts  Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.  Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. SN1PER COMMUNITY FEATURES:  Automatically collects basic recon (ie. whois, ping, DNS, etc.)  Automatically launches Google hacking queries against a target domain  Automatically enumerates open ports via NMap port scanning  Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers  Automatically checks for sub-domain hijacking  Automatically runs targeted NMap scripts against open ports  Automatically runs targeted Metasploit scan and exploit modules  Automatically scans all web applications ...

Latest Hacking News Podcast #152

Mac trojan masquerading as cryptocurrency ticker, Girl Scouts suffer data breach and as brain implant technology progresses the vulnerabilities become more dangerous on episode 152 of our daily podcast. Latest Hacking News Podcast #152 on Latest Hacking News . from Latest Hacking News https://ift.tt/2ETSynP

The Much Awaited MacOS’ Adroid File Transfer’s Bug Will Be Fixed At Last

The Crucial Roles of AI and Data Center Colocation in IT Security by Ben Ferguson

Image
Facebook Twitter Google+ LinkedIn Few things in the world of computing are receiving more buzz these days than Artificial Intelligence (AI), Machine Learning (ML), the Internet of Things (IoT), and Cloud Computing. Where once these were considered to be bleeding-edge technologies that only the most forward-thinking IT organizations were using, the adoption rates of these solutions are increasing exponentially, and more organizations are incorporating these once bleeding-edge technologies into their IT strategies by the day (so much so that I actually heard a commercial regarding IoT on sports talk radio the other day, but that’s another story). As the adoption rates of AI, ML, IoT, and Cloud Computing increase, so too will their roles in the future of cyber security. This article will address how the need to defend the rapidly expanding web will fundamentally change both the security tools we use as well as the data center environment itself. Defining the Challenge As IoT beco...

This Tor Enabled Sim Card Will Keep Your Communication Anonymous

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits:  brasshorncommunications This SIM Card Directs Your Mobile Data Through Tor Although technology has overall made life easier, it has made things a lot less private. As a result, you need to be extra careful when you are browsing online, as it very difficult to maintain privacy out there. It is even possible that your ISP or VPN provider is maintaining a log of everything that you do online. So, how do we protect our online privacy? Brass Horns Communications, a UK-based non-profit internet service provider that focuses on privacy and anti-surveillance services, has an answer for this. The company is currently beta-testing a SIM card that will automatically route your data through Tor, thereby securing online privacy and evading surveillance. For those unaware, Tor (originally...

Trump’s tapped phone may be the largest White House breach ever: former official

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: ABC NEWS The president had been warned. The  New York Times  now reports that American spy agencies have learned that China and Russia have been eavesdropping on President Trump’s personal calls to friends and colleagues from one of his iPhones, in an effort to influence U.S. policy. “This stunning revelation by the  NYT  is one that has sweeping ramifications for intelligence and the security of the American people,” says former White House chief information officer Theresa Payton in an email to  Fast Company . Trump reportedly has three iPhones, but only two of them are equipped with security features that have been added by the National Security Agency. One of the secure phones is strictly intended for tweeting, and only over Wi-Fi networks. His third ...

Jarbas: 1 Vulnhub CTF Challenge Walkthrough

Introduction Name: Jarbas: 1 Date release: 3 Apr 2018 Jarbas :1 remains one of the best  boxes for beginners, the Jarbas: 1 Vulnhub CTF Challenge Walkthrough on Latest Hacking News . from Latest Hacking News https://ift.tt/2JmVZSB

Serious Vulnerability Discovered In X.Org Server Affects Major Linux and BSD Variants

An Indian researcher discovered an important local privilege escalation vulnerability that poses a security threat to most Linux distros and Serious Vulnerability Discovered In X.Org Server Affects Major Linux and BSD Variants on Latest Hacking News . from Latest Hacking News https://ift.tt/2AxdaOC

Latest Hacking News Podcast #151

Interview with software developer Iain Row on the experience of reporting a vulnerability he discovered on the website of UK-based retailer Card Factory. Latest Hacking News Podcast #151 on Latest Hacking News . from Latest Hacking News https://ift.tt/2ze0Il4

Apple Blocks GrayKey Passcode Cracking Tech With The Latest iOS 12 Update

GrayKey technology gained significant popularity, particularly among the security officials, owing to its exceptional feature of cracking iPhone passcodes. While Apple Blocks GrayKey Passcode Cracking Tech With The Latest iOS 12 Update on Latest Hacking News . from Latest Hacking News https://ift.tt/2JmicjC

Vulnerability In Microsoft Word Online Video Feature Allows for Phishing

Researchers have discovered another way through which bad actors may phish! The method employs exploiting a vulnerability in the Microsoft Vulnerability In Microsoft Word Online Video Feature Allows for Phishing on Latest Hacking News . from Latest Hacking News https://ift.tt/2AwrmXZ

Consulting Firm Leaked Data Of Democratic Party Fundraisers In Unsecured NAS Device

As the US elections are nearing, reports about hacks and data breaches involving political parties seem to repeatedly surface online. Consulting Firm Leaked Data Of Democratic Party Fundraisers In Unsecured NAS Device on Latest Hacking News . from Latest Hacking News https://ift.tt/2RjcUIE

British Airways Hack Update: 185,000 More Customers Found Affected

Last month, we heard of a shocking data breach at British Airways that affected thousands of customers. The hackers allegedly British Airways Hack Update: 185,000 More Customers Found Affected on Latest Hacking News . from Latest Hacking News https://ift.tt/2z9bAAE

Cisco Patched Privilege Escalation Vulnerability In Webex Meetings Desktop App

Cisco has recently fixed a serious privilege escalation vulnerability in its Webex Meetings app. The vulnerability could allow an attacker Cisco Patched Privilege Escalation Vulnerability In Webex Meetings Desktop App on Latest Hacking News . from Latest Hacking News https://ift.tt/2ES9tqP

‘A cyber-attack could stop the country’

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: BBC Our homes and cities are getting “smarter” – thermostats, video doorbells, sprinkler systems, street lights, traffic cameras, cars. all connected to the internet, collecting and transmitting useful data. And 5G superfast mobile is seen as a catalyst that will light up this massive network. GSMA Intelligence forecasts that there will be more than 25 billion “internet of things” connections by 2025. But experts are queuing up to issue stark warnings about security. “Security around IoT devices hasn’t been very good, so if they’re opened up to better connectivity they’re opened up to more hackers, too,” says Cody Brocious, education lead at security consultancy HackerOne. “Not enough is being done to improve their security, and it’s only going to get worse when they become 5G-connected. We’ll see ...

How This Secret Cyber Security Centre In Chennai Protects All Of Us In India From Cyber Attacks

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: IndiaTimes Rows of young people sit glued to their workstations in a room behind a reinforced glass panel. Each has his or her own PC to work with, attached to two side-by-side display monitors; they may look fresh out of college, but these 300-odd specialists are protecting each one of us from cyber-attacks. On one of the screens in front of them is real-time data of 50-60% of India’s Internet traffic. And every single person in the room is trying to detect and stop anything that can jeopardize India’s Internet connection. Talk about no pressure. This Chennai-based cyber security facility at Tata Communications, which is at the frontline of protecting Indian businesses and people from online threats, is a sign of things to come. Between 2015-2017, India was the second-most targetted country for cybe...

Cyberry: 1 Vulnhub Hacking Challenge Walkthrough

Cyberry:1 is a boot2root challenge designed for Beginners to intermediate.Its a Debian box that is supported by Vmware. Since DHCP Cyberry: 1 Vulnhub Hacking Challenge Walkthrough on Latest Hacking News . from Latest Hacking News https://ift.tt/2Oc8UaS

Facebook Fine Of £500,000 Confirmed By UK ICO Over Cambridge Analytica

After all the madness that happened with Facebook, they now have to pay for their chaos. In July, we heard Facebook Fine Of £500,000 Confirmed By UK ICO Over Cambridge Analytica on Latest Hacking News . from Latest Hacking News https://ift.tt/2qguXUe

Exposed Docker Apis Used By Attackers In Creation Of New Containers That Perform Cryptojacking

Microsoft’s Digital Crime Unit busy catching cyber thugs in India

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: IndiaTimes In a significant operation earlier this month, the cyber cell of Delhi Police arrested 24 people who posed as tech support staff and duped several US citizens. This could not have been possible without the the real-time monitoring of cyber crimes by Microsoft’s Digital Crime Unit (DCU) in Redmond that is using Cloud, Big Data, Machine Learning  (ML) and Business Intelligence (BI) to improve the security of its products and services, protect vulnerable populations, fight malware, and reduce digital risks. The real-time data analytics and sharing of key inputs with relevant law enforcement agencies helped bust 10 companies that were illegally running call centres at various places in Delhi that targeted Microsoft Windows users. “It was real-time monitoring that helped us crack the Del...

How To Prevent Your Business Becoming Collateral Damage Of Geopolitical Cyber Conflict

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits:  Forbes According to Bryan Becker, an application security researcher at WhiteHat Security, the United States is “woefully behind the entire developed world in terms of cybersecurity.” Defensively, he insists, it would “easily take us a decade” and then some to catch up with allies and competitors alike. Does this mean that it’s up to the cybersecurity industry, rather than the military, to protect systems and data from nation-state attack? I’ve been exploring the role of cybersecurity vendors when it comes to cyberwarfare, and what business needs to do in order to prevent becoming a collateral damage statistic in the ongoing geopolitical cyber conflict. Mention cyberwarfare and most businesses tend to sigh and move on to something less weighted down with the baggage of hyperbole. Which, truth be ...