Posts

Showing posts from November, 2018

EternalSilence – New Variant Of UPnProxy Exploit Discovered Affecting 45,000 Routers

Earlier this year, Akamai researchers discovered a UPnProxy attack targeting thousands of routers. Now, after so many months, they have found EternalSilence – New Variant Of UPnProxy Exploit Discovered Affecting 45,000 Routers on Latest Hacking News . from Latest Hacking News https://ift.tt/2AAFy19

Knock – Open Source Subdomain Scanner Tool

Knock is a python based tool for enumerating subdomains on a targeted domain. You can use a custom wordlist and Knock – Open Source Subdomain Scanner Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/2E5cYcb

UK Parliament continues to pursue FaceBook, Seizes Documents

The UK Parliament recently seized certain controversial Facebook-related documents from Ted Kramer, Founder of Six-Four-Three, a US-based application development firm. UK Parliament continues to pursue FaceBook, Seizes Documents on Latest Hacking News . from Latest Hacking News https://ift.tt/2FLbmGe

Irish Authorities Lash Out at LinkedIn for GDPR Violations

LinkedIn was recently in conflict with the General Data Protection Regulation (GDPR), which upset the Irish authorities. Apparently, the Microsoft-owned Irish Authorities Lash Out at LinkedIn for GDPR Violations on Latest Hacking News . from Latest Hacking News https://ift.tt/2Rqvwqj

North Korean hackers are coming for your bitcoin

Image
After reports of North Koreans using Bitcoin to evade sanctions and hackers involved in stealing half a billion dollars in cryptos from exchanges emerged, now experts say, they are targeting individual investors. North Korean hackers have taken to stealing cryptocurrency from individual investors as part of a new strategy by Pyongyang to blunt the impact of international sanctions targeting its illicit nuclear weapons programme. A number of experts have previously shared that North Korea continues to use bitcoin to evade US sanctions. Just last month a report by Russian cybersecurity company Group IB stated that Lazarus, an infamous hacking group of North Korea stole about half a billion dollars in cryptocurrencies. The targeting of individuals holding virtual currencies such as bitcoin marks a departure from its previous methods, which have targeted exchanges and financial institutions. This group reportedly was also behind the 14 hacks on cryptocurrency exchanges since Janu...

Dell Urges Customers to Reset Passwords Following a Potential Data Breach

Wave-Share- Serverless, Peer-to-Peer, Local File Sharing Through Sound

Image
Wave-Share- Serverless, peer-to-peer, local file sharing through sound A proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the browser. Nearby devices negotiate the WebRTC connection by exchanging the necessary Session Description Protocol (SDP) data via a sequence of audio tones. Upon successful negotiation, a local WebRTC connection is established between the browsers allowing data to be exchanged via LAN. How it works The WebRTC technology allows two browsers running on different devices to connect with each other and exchange data. There is no need to install plugins or download applications. To initiate the connection, the peers exchange contact information (ip address, network ports, session id, etc.). This process is called "signaling". The WebRTC specification does not define any standard for signaling - the contact exchange can be achieved by any protocol or technology. In this project the ...

Latest Hacking News Podcast #174

Zoom conferencing app vulnerability, Dunkin' Donuts alerts customers to a potential data breach, and malware attacks decrease over Thanksgiving weekend on episode 174 of our daily podcast. Latest Hacking News Podcast #174 on Latest Hacking News . from Latest Hacking News https://ift.tt/2raahO8

Russian hackers have found a new way to cash out the stolen money

Image
Bankers started talking about a new withdrawal scheme for funds stolen by hackers. This time, the attackers decided to use a legitimate mechanism — when bailiffs withdraw money on the writ of execution for previously recognized debts for payment of legal services. The presence of a new fraudulent scheme was confirmed in the largest Banks, where they also noted that the attackers connected lawyers and writs of execution to the withdrawal process. The whole scheme begins with a conditional theft of funds from a corporate client, during which a substitution of details is used. The aim of the hackers is to transfer money into the account of an apparently non-operating company. Usually, with this method, the client notifies the Sender’s Bank of the theft, and that, in turn, notifies the Beneficiary’s Bank, which leads to the freezing of funds. The bailiffs send an absolutely legal writ of execution, according to which the stolen amount is required to pay the a one-day company deb...

Empire – Open Source Post-Exploitation Agent Tool

Empire is regarded as one of the most useful frameworks by many penetration testers. It has many different powershell and Empire – Open Source Post-Exploitation Agent Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/2rcPLww

NSA Exploits From A Year Ago Are Back In A More Powerful Form To Haunt Unpatched Devices.

NATO readies for growing cyberthreats

Image
It’s hard to believe we’re not far away from the 20th anniversary of the dreaded Y2K bug that put fear into every technology professional’s life at the turn of the millennium. The Y2K bug was initially thought to be a major safety threat because experts claimed there were significant flaws in the software of computers that controlled many critical systems such as air traffic control, the electric grid, banking, traffic lights and other key resources. In hindsight, the threat was over-hyped. None of the dire predictions came true – partly due to preparation, but mostly because such systems were not so heavily automated and had human intervention to prevent catastrophe. Unfortunately, no vertical market has remained immune from the harmful aftermath of a successful cyber-attack or data breach. The situation is only exacerbated with regards to the Internet of Things (IoT), as the sheer volume of these devices continues to grow with each passing year. The IoT device explosion has seen ...

BitPay XSS Hack Used to Steal Private Keys From Unsuspecting Customer Wallets

The CoPay Bitcoin Wallet was recently hit with a malicious Cross-site scripting exploit that enabled private keys of its users BitPay XSS Hack Used to Steal Private Keys From Unsuspecting Customer Wallets on Latest Hacking News . from Latest Hacking News https://ift.tt/2TVKerc

Your Internet Connection is most likely “hacked”; Experts say so

Blazy – Open Source Modern Login Brute-forcer

I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy is not just another brute-force Blazy – Open Source Modern Login Brute-forcer on Latest Hacking News . from Latest Hacking News https://ift.tt/2E57DBA

An Overview of Social Credit Ratings in China

China has emerged as one of the most technologically advanced countries, far ahead of its contemporaries. Upholding its status, China An Overview of Social Credit Ratings in China on Latest Hacking News . from Latest Hacking News https://ift.tt/2RkNE4V

Latest Hacking News Podcast #173

Two charged in connection with SamSam ransomware, breach exposes 2.65 million Atrium Health records, and Dell resets passwords following attempted breach on episode 173 of our daily podcast. Latest Hacking News Podcast #173 on Latest Hacking News . from Latest Hacking News https://ift.tt/2Qrlc4j

Uber Fined Over £900,000 for 2016 Data Breach

Veil-Framework – Open Source Tool to Bypass Common Anti-Virus Solutions

Based on python, the Veil-Framework is one of the most popular tools for Anti-Virus evasion. You can generate many different Veil-Framework – Open Source Tool to Bypass Common Anti-Virus Solutions on Latest Hacking News . from Latest Hacking News https://ift.tt/2FV8Bm2

Facebook Appeals the Cambridge Analytica Case

The Social Network Giant was recently been slapped with a fine of £500,000 which they have chosen to appeal. The Facebook Appeals the Cambridge Analytica Case on Latest Hacking News . from Latest Hacking News https://ift.tt/2P44zqt

Latest Hacking News Podcast #172

Google details the discovery and takedown of 3ve fraud botnet, eight charged in connection to 3ve fraud ring, and Microsoft MFA fails a second time on episode 172 of our daily podcast. Latest Hacking News Podcast #172 on Latest Hacking News . from Latest Hacking News https://ift.tt/2DO1EQS

Google accused of violating GDPR privacy by seven European countries

Image
A group of consumer agencies in seven European countries has filed a  privacy complaint against Google for allegedly tracking the location of millions of  web users. The European Consumer Organisation (BEUC), an European consumer organization  which has seven members- the Netherlands, Poland, Czech Republic, Greece, Slovenia, Sweden, and Norway claims that Google’s “deceptive practices"  of location tracking don't take users permission to enable it or not, and the company fails to inform its users about tracking policies. A research conducted by a Norway‘s consumer group, Forbrukerrådet revealed that Google is violating European Union's new data protection framework, General Data Protection Regulation (GDPR), if the complaint is upheld, then it could mean a hefty fine for the search giant. According to BEUC, by hook or crook Google  enable the settings ‘location history’ and ‘web and app activity’ on users devices which are integrated into all Google ...

Uber Fined $1.2 Million By The UK ICO And Dutch DPA Over The 2016 Hack

Two years back, Uber suffered a massive data breach that exposed a mammoth database to hackers. However, Uber preferred to Uber Fined $1.2 Million By The UK ICO And Dutch DPA Over The 2016 Hack on Latest Hacking News . from Latest Hacking News https://ift.tt/2r77wgu

Why Australia Should Not Hurry With Its Encryption Bill

The Australian Parliament has recently heard the Australian Prime Minister put forth his appeal for the Telecommunications and Other Legislation Why Australia Should Not Hurry With Its Encryption Bill on Latest Hacking News . from Latest Hacking News https://ift.tt/2RfpbxW

Unpatched Linux Kernel Vulnerabilities Could Be Exploited For Local Dos

Synthetic Fingerprints Make Biometric/Fingerprint Recognition Systems Vulnerable

From smartphone lock systems to identity verification, people consider fingerprint scans a viable method of security. However, scientists have figured Synthetic Fingerprints Make Biometric/Fingerprint Recognition Systems Vulnerable on Latest Hacking News . from Latest Hacking News https://ift.tt/2DPd86S

mitmAP – An Open Source Tool to Create a Fake Access Point and Sniff Data

The Evil Access Point (AP) attack has been around for a long time. There are several ways to create this mitmAP – An Open Source Tool to Create a Fake Access Point and Sniff Data on Latest Hacking News . from Latest Hacking News https://ift.tt/2DNHpCJ

Mirai Bot Targets Linux Servers Through Hadoop Vulnerability

Mirai Bot, best-known for exploiting IoT Devices has recently been attacking Linux Servers through the Hadoop YARN Vulnerability. Reportedly, many Mirai Bot Targets Linux Servers Through Hadoop Vulnerability on Latest Hacking News . from Latest Hacking News https://ift.tt/2r8boOd

People Tracker On The Internet- OSINT Analysis And Research Tool

Image
TRAPE- OSINT Analysis And Research Tool People tracker on the Internet: Learn to track the world, to avoid being traced. Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control over their users through the browser, without them knowing, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals. Features- LOCATOR OPTIMIZATION: Trace the path between you and the target you're tracking. Each time you make a move, the path will be updated, by means of this the location of the target is obtained silently through a bypass made in the browsers, allowing you not to skip the location request permit on the victim's side , objective or person and at ...

Latest Hacking News Podcast #171

Ransomware forces Ohia and West Virginia hospitals to divert ER patients, Knuddels app receives Germany's first GDPR fine and a report shows users are less trusting but more active in their smartphone data security on episode 171 of our daily podcast. Latest Hacking News Podcast #171 on Latest Hacking News . from Latest Hacking News https://ift.tt/2FGbyGT

The representative of the Russian Foreign Ministry commented on the British Integrity Initiative project

Recall, the hacker group Anonymous was able to catch the British Integrity Initiative project in the “anti-Russian propaganda”. It is noted that with the help of the project the United Kingdom intervenes in the internal Affairs of other countries. It is noteworthy that the British authorities deny the existence of this organization. According to the official Representative of the Russian Ministry of Foreign Affairs Maria Zakharova, the Ministry is studying the published information. At the same time, Zakharova said that the Russian Foreign Ministry drew attention to the fact that the official structures of the Great Britain refused to comment on this matter. The country tried to turn the story into a joke. In addition, the conversation about the British project was supported by the head of the Center for Political Studies of the Institute of Economics Boris Shmelev. According to him, it is impossible to say for sure that hackers have materials. They have to prove it. According to ...

$63 Billion Deleted From Crypto in 7 Days, Ethereum Drops Under $100

New Linux trojan can disable your antivirus and steal root passwords

Image
Malware targeting Linux users may not be as widespread as the strains targeting the Windows ecosystem, but Linux malware is becoming just as complex and multi-functional as time passes by. The device on the Linux operating system a new Trojan striking-miner is able to remove employees in the system of anti-virus software reported on the website of the company “Doctor Web”, a Russian antivirus maker that was able to track the malware for an extended period time. This malware can install bitcoin miners on systems. The malware has over 1,000 lines of code and is more complex than most other Linux malware. Linux is known to be a much safer OS compared to other desktop alternatives, but it is nowhere near perfect. Trojan also installs a rootkit and another strain of malware that can execute Distributed Denial of Service (DDoS) attacks. The malware called by its generic detection name of Linux.BtcMine.174 when run, scans your system and looks for the folder where it can up...

Galileo – Open Source Web Application Auditing Framework

Galileo is a free web application auditing framework that can perform various penetration testing tasks, such as information gathering, fingerprinting, Galileo – Open Source Web Application Auditing Framework on Latest Hacking News . from Latest Hacking News https://ift.tt/2Sf6jiz

Trivial Spotify Phishing Campaign Targets Users To Steal Login Credentials

Spotify users have to become cautious due to another round of a Spotify phishing campaigns that targets users’ credentials. The Trivial Spotify Phishing Campaign Targets Users To Steal Login Credentials on Latest Hacking News . from Latest Hacking News https://ift.tt/2DKsWrl

Singapore High Court Orders Blocking of Streaming Devices by ISP’s

In a bid to curb the increasing menace of piracy, a Singapore High Court has issued directions to ISPs (Internet Singapore High Court Orders Blocking of Streaming Devices by ISP’s on Latest Hacking News . from Latest Hacking News https://ift.tt/2R9yKyh

Frustrated Fallout 76 Player Cursed With Permanent God Mode Due To A Bug

Game glitches, particularly those inadvertently endowing benefits to the players are usually loved. For instance, the bug in the Red Frustrated Fallout 76 Player Cursed With Permanent God Mode Due To A Bug on Latest Hacking News . from Latest Hacking News https://ift.tt/2FH17CZ

Microsoft Fixed Outlook 2010 Crashes Triggered By November Patch Tuesday

While an update bundle supposedly addresses flaws, Microsoft November Patch Tuesday didn’t seem so good for users. After the update, Microsoft Fixed Outlook 2010 Crashes Triggered By November Patch Tuesday on Latest Hacking News . from Latest Hacking News https://ift.tt/2SdAeI9

Apache Hadoop YARN NodeManager Daemon Falls Prey To Zip Slip Vulnerability

A few months ago, researchers discovered the Zip Slip vulnerability that could trigger remote code execution attacks. As disclosed at Apache Hadoop YARN NodeManager Daemon Falls Prey To Zip Slip Vulnerability on Latest Hacking News . from Latest Hacking News https://ift.tt/2KvHDQt

MageCart Kills Competition By Rendering The Rival’s Marketable Data Worthless

VMWare Patched Critical Vulnerability In Workstation And Fusion

Recently, VMware patched critical vulnerability affecting its Workstation and Fusion software. The bug could allegedly allow an attacker to execute VMWare Patched Critical Vulnerability In Workstation And Fusion on Latest Hacking News . from Latest Hacking News https://ift.tt/2DKebof

An Overview of the Sophos 2019 Report

The Cyber Security firm has recently released an in-depth research report enabling internet users and businesses to become wary of An Overview of the Sophos 2019 Report on Latest Hacking News . from Latest Hacking News https://ift.tt/2KvmkhS

German e-government SDK patched against ID spoofing vulnerability

Germany has patched a key "e-government" service against possible impersonation attacks, and both private and public sector developers have been told to check their logs for evidence of exploits. Vulnerability in web library lets attackers spoof electronic ID card identities. The vulnerability, when exploited, allows an attacker to trick an online website and spoof the identity of another German citizen when using the eID authentication option. There are some hurdles that an attacker needs to pass before abusing this vulnerability, but the researchers who found it say their eID spoofing hack is more than doable. In July, SEC Consult, the German cyber-security firm who discovered the flaw in this SDK, warned the country's federal computer emergency team at CERT-Bund that software supporting the government's nPA ID card had a critical vulnerability (the ID cards themselves have not been breached). Thereafter, Germany's Computer Emergency Response Team coordinate...

Ethereum Vulnerability Allowed Minting GasToken To Sweep Crypto Exchanges

A recently discovered Ethereum vulnerability could have allowed hackers to drain a huge amount of money from crypto exchanges. The Ethereum Vulnerability Allowed Minting GasToken To Sweep Crypto Exchanges on Latest Hacking News . from Latest Hacking News https://ift.tt/2Re1LJd

Fraudsters using Google Map flaw to dupe people

Image
Scammers have found a new loophole in the Google Maps  interface that allows them to edit the contact details and addresses of major banks, by which they have tricked users into revealing their their bank details like CVV and ATM PINs. According to Google’s User Generated Content policy, anyone can edit the contact details and address on the platform. Taking advantage of this flaw,  a group of Thane-based con artists have updated the contact details of Bank of India and putted their own contact number, by this way they have been able to fool people. “We have received at least three complaints from the Bank of India (BoI) over the last one month. In all three instances, we immediately notified the authorities at Google,” the Superintendent of Police, Balsing Rajput of the State cyber police quoted in the Hindu. Meanwhile, the Bank of India spokesperson said that they have checked and changed the contact details of their branches on the Google Maps. BOI's spokesper...

Adobe Patched A Critical Flash Player Vulnerability Disclosed Publicly

Adobe Flash Player vulnerabilities and their subsequent patches are no surprise to us. Once again, Adobe has patched a critical Adobe Patched A Critical Flash Player Vulnerability Disclosed Publicly on Latest Hacking News . from Latest Hacking News https://ift.tt/2Ajq7tU

The Best Way to Remove Malware from Mac Is Here

MacOS Penetration Test Reveals Three Zero-Day Vulnerabilities

Recently, DropBox undertook a Pen Test to highlight potential vulnerabilities with Mac OS. Syndis, a Cyber Security firm was engaged MacOS Penetration Test Reveals Three Zero-Day Vulnerabilities on Latest Hacking News . from Latest Hacking News https://ift.tt/2AjcAm6

US Postal Service fixed a year old vulnerability

The US Postal Service says it has fixed a security weakness on usps.com for sometime that let anyone see the personal account info of its users, including usernames and street addresses. The open vulnerability was reportedly identified over a year ago by an independent researcher but USPS never patched it until this week, when information security reporter Brian Krebs on Security flagged the issue after he received a tip from an anonymous security researcher. The USPS fixed the error within 48 hours after then. The flaw exposed personal data for 60 million 'Informed Visibility' accounts. “It was caused by an authentication weakness in the site’s application programming interface (API) that allowed anyone to access a USPS database offered to businesses and advertisers to track user data and packages. The API should have verified whether an account had permissions to read user data but USPS didn’t have such controls in place.” Users were not simply exposed by sending and re...

US Postal Service took a year to fix API flaw that exposed 60 million users' data

Image
The US Postal Service has finally fixed a security bug that allowed anyone logged onto the service to view the personal details of  other 60 million account holders. The vulnerability was earthed over a year ago, but was patched yesterday after Krebs on Security flagged the issue as an anonymous security researcher informed them about the flaw. According to researcher, it was caused by an authentication weakness in the application programming interface (API) that let users to access a USPS database for tracking packages. The data that bug exposed includes email address, username, user ID, account number, street address, phone number, authorized users, mailing campaign data and more. USPS has released an official statement, and said that the incident is under investigation. "We currently have no information that this vulnerability was leveraged to exploit customer records," USPS says. "The information shared with the Postal Service allowed us to quickly miti...

Pedophiles are using Chinese apps to groom underage girls into porn: Experts

Image
Social video apps have been gaining favour in India recently. We're not talking about YouTube here, but apps focusing on ultra-short clips of about 15 seconds. A clip was seen where a young girl, not more than 12 years old is dressed in a bright pink lehenga and a royal blue velvet blouse. She is standing in the middle of a field and swaying her body, shaking her hips, her chest heaving as she dances to a popular Hariyanvi number that goes Meri jalti jawani maange paani paani. It’s a 15-second clip on a short video app called Kwai popular in India. There’s another video of the girl in the same setting and clothes dancing with a boy about the same age, thrusting their bodies at each other in another song. In another video, a girl about 10, looks directly at the camera, smiles sheepishly and parrots this couplet like she has just memorized the lines: Chadar odh kay sona, takiya modd kay sona, meri yaad aye, toh jagah chhod kay sona. A man’s voice behind the camera prods her: “A...

Xerosploit – Open Source Toolkit For Man In The Middle Attacks

Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines the power of bettercap and Xerosploit – Open Source Toolkit For Man In The Middle Attacks on Latest Hacking News . from Latest Hacking News https://ift.tt/2zlBZvF

21-Year-Old Arrested For SIM Swapping Hack; Allegedly Steals $1 Million

USPS Bug affects 60 Million Users, Finally Fixed.

USPS has recently dealt with one of the biggest vulnerabilities that jeopardized the personal information of all of its 60 USPS Bug affects 60 Million Users, Finally Fixed. on Latest Hacking News . from Latest Hacking News https://ift.tt/2S7L1Dx

First Set Of Global Standards Rolled Out For Drones – Designed To Protect Aircraft

Drone operators will soon be under the purview of ISO’s global standards, a set of regulatory frameworks that the drone First Set Of Global Standards Rolled Out For Drones – Designed To Protect Aircraft on Latest Hacking News . from Latest Hacking News https://ift.tt/2Qc9n1M

Latest Hacking News Podcast #170

The USPS fixed a security vulnerability exposing 60 million users' info a year after being notified and Dropbox disclosed three macOS zero-day flaws allowing for system takeover when chained together on episode 170 of our daily podcast. Latest Hacking News Podcast #170 on Latest Hacking News . from Latest Hacking News https://ift.tt/2DD8A3e

Amazon's technical error leaks customers names and email addresses

Image
World's largest e-commerce website Amazon has sent out emails to some of its customers informing them about a “technical error” that exposed their emails IDs and user names  on its website  publicly. However, Amazon refused to elaborate the nature of the "technical error," and the number of customers affected by this error. The company said in In a statement, "We have fixed the issue and informed customers who may have been impacted." Amazon customers across Europe and the United States tweeted a screenshot of the email. The company has appealed affected customers need not to panic, changing their password is not necessary.  Although phishing attackers could use affected customers names and emails to attempt to reset their accounts or target their emails. Amazon has fired the employee who was behind the technical error. Their letter sent to the customers states: "We are writing to let you know that your email address was disclosed by an Ama...

Over 6,500 Sites Down as Hackers Wiped Out Database

Image
Daniel's Hosting, one of the most popular and largest hosting services providers for the 'Dark Web' Tor network was heavily targeted by cybercriminals, the hack attack wiped the server clean of 6,500 websites. Though the attack and the statistics have been confirmed by the service, the administrator still does not know where the vulnerability exactly is.  Apparently, the websites have been forced to go offline but there's more to the injury.  Acknowledging the hack attack, Daniel Winzen who is a German software developer and the hosting administrator stated on the hosting provider's website that the attack was instigated on Thursday i.e., 15th of November which is a day after a PHP zero-day exploit was leaked.     Referenced from Winzen's writings, “The account “root” has been deleted,”  “To this day around 6500 Hidden Services were hosted on the server and there is no way to recover from this breach, all data is gone.” “I might re-enable th...

Facebook And Instagram Went Down Due To A Server Bug

Facebook makes it into the news once again for troubling users globally. Supposedly, Facebook users have faced trouble with Instagram Facebook And Instagram Went Down Due To A Server Bug on Latest Hacking News . from Latest Hacking News https://ift.tt/2qZuFBq

Emoji Kitten Denial Of Service Attack Continues to Haunt Skype

Emoji kittens are the latest trouble mongers in the string of Skype vulnerabilities discovered over the past 3 years. Presently, most Emoji Kitten Denial Of Service Attack Continues to Haunt Skype on Latest Hacking News . from Latest Hacking News https://ift.tt/2PPdm55

Australian Encryption Bill Shrouded in Mystery

Australian Parliament has been evaluating the proposed encryption bill, which is presently one of the most controversial bills out there. Australian Encryption Bill Shrouded in Mystery on Latest Hacking News . from Latest Hacking News https://ift.tt/2PKl4Nz

Banks suspended work with the Unistream Bank due to hacker attacks

Image
Many Russian Banks have suspended or terminated cooperation agreements with the Unistream Bank after a hacker attack. On November 19, Fincert warned that some credit institutions blocked all incoming correspondence from the Unistream Bank after sending malicious content from its legal e-mail address. As it became known, the recipients of the "malicious mailing" were many Banks from its partners in Russia, as well as in the CIS. Foreign partners reacted harshly to the hacking of Unistream Bank— some banks from Kyrgyzstan, Tajikistan and Uzbekistan suspended cooperation with the Unistream Bank. For example, Orient Express Bank prematurely terminated the contract on cooperation. Some Russian banks have suspended cooperation for a while. However, some organizations, such as the Mail-Bank, didn't see the reason to break contracts. Representatives of the Unistream Bank deny the suspension of contracts with partners. The credit organization said that the investigation...

Latest Hacking News Podcast #169

Facebook increases Bug Bounty payouts for account takeover vulnerabilities, Amazon leaks customer email addresses, and Maria malware evolves to target servers on episode 169 of our daily podcast. Latest Hacking News Podcast #169 on Latest Hacking News . from Latest Hacking News https://ift.tt/2S3T7x9

Mac users using Exodus wallet hit by spam

Image
Security researchers at F-Secure have recently uncovered a small spam campaign aimed at delivering spyware to Mac users that use Exodus cryptocurrency wallet. The campaign leverages Exodus-themed phishing messages using an attachment named “Exodus-MacOS-1.64.1-update.zip.” The messages were sent by accounts associated with the domain “update-exodus[.]io”, the attackers used it to trick victims into believing that it was a legitimate domain used by the Exodus organization. The malware poses itself as a fake Exodus update, it is using the subject “Update 1.64.1 Release – New Assets and more”. Experts pointed out that the latest released version for Exodus is 1.63.1. The zip archive includes an application created earlier this month that contains a Mach-O binary with the filename “rtcfg”.The researchers analyzed the code and found several strings and references to the “realtime-spy-mac[.]com” website, a cloud-based remote spy software for Mac systems. “From the website, the deve...

Track-pad Mode on iPhone and iPad; Changes The iOS Keyboard Into A Mouse

Vision Direct Deals With Customer Data Leak

Vision Direct, UK’s biggest online retailer involved in the business of supplying contact lens has recently hit the headlines for Vision Direct Deals With Customer Data Leak on Latest Hacking News . from Latest Hacking News https://ift.tt/2Q9hiwW

Osmedeus - Automatic Reconnaissance And Scanning In Penetration Testing

Image
Osmedeus - Automatic Reconnaissance And Scanning In Penetration Testing What is Osmedeus? Osmedeus allow you to do boring stuff in Penetration testing automatically like reconnaissance and scanning the target by run the collection of awesome tools. Installation git clone https://ift.tt/2qGxk2Y cd Osmedeus ./install.sh This install only focus on Kali linux, check more install on Wiki page How to use If you have no idea what are you doing just type the command below or check out the Advance  Usage ./osmedeus.py -t example.com List all module ./osmedeus.py -M Update ./osmedeus.py --update Video demo Download Osmedeus from Hackers Online Club (HOC) https://ift.tt/2KpKslQ

Red Hawk – Open Source Information Gathering and Vulnerability Scanning Tool

Red Hawk is an open source tool that is used for information gathering and certain vulnerability scanning. Red Hawk detects Red Hawk – Open Source Information Gathering and Vulnerability Scanning Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/2qTWzyS

UK Infrastructure Allocates £1.9 Billion For Cyber Security Boost

Members of Parliament at the UK have recently pointed out the country’s lack of leadership in the cybersecurity domain. Unfortunately, UK Infrastructure Allocates £1.9 Billion For Cyber Security Boost on Latest Hacking News . from Latest Hacking News https://ift.tt/2R15zNU

Latest Hacking News Podcast #168

Active XSS attacks exploiting vulnerable Wordpress plugin, Sofacy aka Fancy Bear using new Cannon Trojan and the Emotet returns with new phishing tricks on episode 168 of our daily podcast. Latest Hacking News Podcast #168 on Latest Hacking News . from Latest Hacking News https://ift.tt/2R1NZcI

The Federal Antimonopoly service in Russia has undergone cyber attack

Image
Representatives of the Federal Antimonopoly service (FAS) of the Russian Federation announced that there was a cyber attack on their resources. The attack occurred last Wednesday. The attack began with a sending to the FAS emails with the virus that steals service logins and passwords. In parallel, there was a cyber attack on the information resources of the FAS, presumably for the purpose of hacking. Also, the Central Office of the Ministry and regional offices were attacked. The Head of Public Relations Department of the FAS Irina Kashunina reported that hackers created for FAS the personal virus - the email with the attached file "Axigen WebMail.htm." The Information Security Service quickly reacted to the incident, there are no victims yet. from E Hacking News - Latest Hacker News and IT Security News https://ift.tt/2Dxi7IW

Facebook Messenger app crashed for users around the world

Image
    Facebook Messenger has crashed for several users around the world, it specifically affected users in the United States and Europe. The outage happened a day just after launching a new feature which allow users to delete messages on the app. However, on late Monday, thousands of users were unable to receive messages, send messages, some of them even faced problem in logging-in, and connecting to the Facebook servers. According to the Down Detector, a portal which track outages report that within ten minutes of Messenger's blackout they got 2,535 reports, and multiple reports were reported from around the world on Twitter. The Messenger was down for a few hours before being set to normalcy. Facebook did not reveal the reason behind the outage. "Messenger is generally reliable, but has had more issues recently, with four outages in September alone," said a Forbes report. The Facebook has introduced a new "Remove for Everyone" feature on i...

European Cinema Chain Loses an Astonishing US$21.5 Million to a Business Email Compromise

Government Agencies and Think Tanks attacked, APT29 suspected

In a recent case of cyber attack, the Russian Government has been accused yet again. Primarily because the attacks coincide Government Agencies and Think Tanks attacked, APT29 suspected on Latest Hacking News . from Latest Hacking News https://ift.tt/2Dwc6MO

CarBlues – Bluetooth Vehicle Hack Exploit Affects Millions Of Vehicles Exposing Users PII

As discovered recently, millions of vehicles are on the verge of hacking due to a Bluetooth hack exploit. Reportedly, vehicle CarBlues – Bluetooth Vehicle Hack Exploit Affects Millions Of Vehicles Exposing Users PII on Latest Hacking News . from Latest Hacking News https://ift.tt/2FuBjd7

What Programming Languages Do We Need for Ethical Hacking? by Saurabh Hooda

Image
Facebook Twitter Google+ LinkedIn Ethical hacking is the art of using hacking skills for helping individuals and organizations securing their systems and software. An ethical hacker needs to break into an application security layer to understand its flaws and limitations. As an application security layer is crafted using a programming language, it’s vital for ethical hackers to have expertise in a multitude of programming languages. There are several programming languages used for designing security systems, ranging from the legendary C and C++ to the relatively newcomers Python and JavaScript. Of course, in addition to a proficiency in programming, ethical hackers also necessitate having a number of other skills, including knowledge of operating systems, networking, and much more . Three aspects of ethical hacking requiring programming languages Not all programming languages are required for ethical hacking. As a matter of fact, there are 3 important aspects of ethical hackin...