What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2018-12-19 23:35:00 (Déjà vu) Microsoft Issues Emergency Patch For Under-Attack IE Zero Day (lien direct) Microsoft today issued an out-of-band security update to patch a critical zero-day vulnerability in Internet Explorer (IE) Web browser that attackers are already exploiting in the wild to hack into Windows computers. Discovered by security researcher Clement Lecigne of Google's Threat Analysis Group, the vulnerability, tracked as CVE-2018-8653, is a remote code execution (RCE) flaw in the IE Hack Vulnerability Threat ★★★★★
BBC.webp 2018-12-19 14:55:04 Nasa hack exposes space agency staff\'s data (lien direct) The US space agency says cyber-thieves may have compromised two of its computer servers. Hack
ZDNet.webp 2018-12-19 01:55:02 NASA discloses data breach (lien direct) Hack took place in October 2018. Agency still doesn't know the number of impacted employees. Data Breach Hack
DarkReading.webp 2018-12-18 16:00:00 Twitter Hack May Have State-Sponsored Ties (lien direct) A data leak was disclosed after attackers targeted a support form, which had "unusual activity." Hack
MalwarebytesLabs.webp 2018-12-18 16:00:00 All the reasons why cybercriminals want to hack your phone (lien direct) Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn't they? We take a look at all the reasons hackers have for breaking into your most precious device-and what you can do to stop it. Categories: 101 FYI Tags: (Read more...) Hack
Kaspersky.webp 2018-12-18 14:50:01 WSJ Webpage Defaced to Support PewDiePie (lien direct) The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend. Hack
Blog.webp 2018-12-18 11:22:26 The Origin of the Quote "There Are Two Types of Companies" (lien direct) While listening to a webcast this morning, I heard the speaker mentionThere are two types of companies: those who have been hacked, and those who don't yet know they have been hacked.He credited Cisco CEO John Chambers but didn't provide any source.That didn't sound right to me. I could think of two possible antecedents. so I did some research. I confirmed my memory and would like to present what I found here.John Chambers did indeed offer the previous quote, in a January 2015 post for the World Economic Forum titled What does the Internet of Everything mean for security? Unfortunately, neither Mr Chambers nor the person who likely wrote the article for him decided to credit the author of this quote.Before providing proper credit for this quote, we need to decide what the quote actually says. As noted in this October 2015 article by Frank Johnson titled Are there really only “two kinds of enterprises”?, there are really (at least) two versions of this quote:A popular meme in the information security industry is, “There are only two types of companies: those that know they've been compromised, and those that don't know.”And the second is like unto it: “There are only two kinds of companies: those that have been hacked, and those that will be.”We see that the first is a version of what Mr Chambers said. Let's call that 2-KNOW. The second is different. Let's call that 2-BE.The first version, 2-KNOW, can be easily traced and credited to Dmitri Alperovitch. He stated this proposition as part of the publicity around his Shady RAT report, written while he worked at McAfee. For example, this 3 August 2011 story by Ars Technica, Operation Shady RAT: five-year hack attack hit 14 countries, quotes Dmitri in the following:So widespread are the attacks that Dmitri Alperovitch, McAfee Vice President of Threat Research, said that the only companies not at risk are those who have nothing worth taking, and that of the world's biggest firms, there are just two kinds: those that know they've been compromised, and those that still haven't realized they've been compromised.Dmitri used slightly different language in this popular Vanity Fair article from September 2011, titled Enter the Cyber-Dragon:Dmitri Alperovitch, who discovered Operation Shady rat, draws a stark lesson: “There are only two types of companies-those that know they've been compromised, and those that don't know. If you have anything that may be valuable to a competitor, you will be targeted, and almost certainly compromised.”No doubt former FBI Director Mueller read this report (and probably spoke with Dmitri). He delivered a speech at RSA on 1 March 2012 that introduced question 2-BE into the lexicon, plus a little more:For it is no longer a question of “if,” but “when” and Hack Threat
no_ico.webp 2018-12-14 14:30:02 Critical Infrastructure Targeted In New Threat Campaign (lien direct) A cyberthreat group using malware tied to the Sony Pictures hack of late 2014 is attacking nuclear, defense, energy, and financial companies in what appears to be a campaign to gather information for future exploitation. In October and November alone, the malware has appeared on systems belonging to at least 87 organizations, most of them in … The ISBuzz Post: This Post Critical Infrastructure Targeted In New Threat Campaign Malware Hack Threat
WiredThreatLevel.webp 2018-12-14 14:00:00 No GPS? A DIY Radio Transmitter Can Help You Navigate (lien direct) The old-school way to navigate is with a clock and a sextant, but you can also hack together this alternative. Hack
SecurityAffairs.webp 2018-12-13 16:00:05 French foreign ministry announced its Travel Alert Registry Hack (lien direct) The French foreign ministry announced today that its travel alert registry website had been hacked and personal data of citizens “could be misused”. The French foreign ministry confirmed tha hackers breached into the Ariane system, its travel alert registry website, and personal data of citizens “could be misused”. The Ariane system provides security alerts to registered […] Hack
SecurityWeek.webp 2018-12-13 02:36:00 U.S. Believes Chinese Intelligence Behind Marriott Hack (lien direct) The United States said Wednesday that China was behind the massive hack of data from hotel giant Marriott, part of an ongoing global campaign of cyber-theft run by Beijing. Hack
itsecurityguru.webp 2018-12-12 16:41:03 Fujitsu EMEIA\'s VP Of Enterprise Cyber Security – Rob Norris – Shares His Cyber Security Predictions For 2019. (lien direct) With breaches hitting our headlines almost on a daily basis, be it public or private, small or large, every organisation in the digital age has become vulnerable to an attack. As attackers always have the initiative, even the best-run company could suffer from a hack or data theft and 2018 has continued to make that […] Hack
no_ico.webp 2018-12-12 16:30:01 Payment System Hack At Texas Hospital (lien direct) Nearly 48,000 patients have been affected by a breach of a credit card processing system that was utilized by Baylor, Scott and White Medical Center, a hospital in Texas. Justin Jett, Director of Audit and Compliance at Plixer: “Medical-related data breaches are lucrative because malicious actors can try to sell data to advertisers based on … The ISBuzz Post: This Post Payment System Hack At Texas Hospital Hack
Blog.webp 2018-12-11 11:48:05 (Déjà vu) Hack the Box: Active Walkthrough (lien direct) Today we are going to solve another CTF challenge “Active”. Active is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Easy Task: To find user.txt and... Continue reading → Hack
CSO.webp 2018-12-10 06:19:00 8 old technologies that still play roles in security (lien direct) It's easy to assume newer is better, but technology that has been around for decades or longer still has a place in cybersecurity. In some cases, it is difficult to hack and therefore less vulnerable. In others, it just continues to be the best option for a very specific purpose.   Hack
SecurityAffairs.webp 2018-12-06 21:54:01 Evidence in Marriott\'s subsidiary Starwood hack points out to China intel (lien direct) According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to the Reuters, people investigating the Marriot data breach believe that it is the result of a cyberattack carried out by Chinese hackers. Last week Marriott International announced that hackers compromised guest reservation database at its subsidiary […] Data Breach Hack
WiredThreatLevel.webp 2018-12-04 21:30:04 GOP Email Hack Shows How Bad Midterm Election Meddling Got (lien direct) Election-related hacking during the midterm season seemed fairly muted, but it turns out that the National Republican Congressional Committee suffered a major breach. Hack
TechWorm.webp 2018-12-04 19:04:02 Hackers steal data of 100 million Quora users (lien direct) Quora hack exposes data of about 100 million users Quora, the question-and-answer sharing website, announced yesterday that data of about 100 million of its users was compromised as a result of unauthorized access to one of their systems by a “malicious third party”. “We recently became aware that some user data was compromised due to unauthorized […] Hack
grahamcluley.webp 2018-12-04 12:58:04 Quora hack leaves details of 100 million accounts exposed (lien direct) Quora hack leaves details of 100 million accounts exposedApproximately 100 million Quora users may have had their information accessed by hackers. Hack
ZDNet.webp 2018-12-03 17:30:00 New online service will hack printers to spew out spam (lien direct) PewDiePie hack has spawned a new web service over the weekend: Printer-Spam-as-a-Service. Spam Hack
Blog.webp 2018-12-02 15:46:02 (Déjà vu) Hack the Box: Hawk Walkthrough (lien direct) Today we are going to solve another CTF challenge “Hawk”. Hawk is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Easy Task: To find user.txt and... Continue reading → Hack
WiredThreatLevel.webp 2018-11-30 16:59:01 The Marriott Hack: How to Protect Yourself (lien direct) Up to 500 people's personal information has been stolen in a Marriott hack that lasted four years, one of the biggest breaches yet. Hack
BBC.webp 2018-11-30 12:08:01 Marriott hack hits 500 million guests (lien direct) The hotel chain says details of up to 500 million guests may have been accessed in a database breach. Hack
SecurityAffairs.webp 2018-11-28 09:56:02 (Déjà vu) Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again (lien direct) Cisco has released a new round of security patches to address potentially serious WebExec Webex flaw first addressed one month ago. One month ago, Cisco addressed the CVE-2018-15442 vulnerability, also tracked as WebExec by Counter Hack researchers Ron Bowes and Jeff McJunkin who discovered it. The flaw affects Cisco Webex Meetings Desktop and has been rated as a […] Hack
TechWorm.webp 2018-11-23 12:51:01 Hack Facebook or Instagram accounts and get paid up to $40,000 (lien direct) Facebook to pay up to $40,000 for finding ways to hack Facebook or Instagram accounts Facebook has been going through a rough patch this year after suffering two severe security breaches that affected millions of its users. While every year, Facebook pays millions of dollars to researchers and bug hunters to find security holes in […] Hack
bleepingcomputer.webp 2018-11-23 06:56:01 First GDPR Sanction in Germany Fines Flirty Chat Platform EUR 20,000 (lien direct) Following a hack that resulted in leaking online about 808,000 email addresses and over 1.8 million usernames and passwords, a social network website in Germany received a fine of EUR 20,000 from the Baden-Württemberg Data Protection Office. [...] Hack
SecurityAffairs.webp 2018-11-22 20:24:02 Chaining 3 zero-days allowed pen testers to hack Apple macOS computers (lien direct) Dropbox team disclosed three critical zero-day vulnerabilities in Apple macOS, chaining them it is possible to take over a Mac computer. Dropbox team disclosed three critical zero-day vulnerabilities (CVE-2017-13890, CVE-2018-4176, CVE-2018-4175) affecting the Apple macOS operating system, an attacker could chain them to remotely execute arbitrary code on a targeted Mac computer. The attacker only needs to trick victims […] Hack
SecurityAffairs.webp 2018-11-21 20:22:00 Facebook increases rewards for its bug bounty program and facilitate bug submission (lien direct) Facebook updates its bug bounty program, it is increasing the overall rewards for security flaws that could be exploited to take over accounts. Facebook announced an important novelty for its bug bounty, the social media giant is going to pay out as much as $40,000 for vulnerabilities that can be exploited to hack into accounts without […] Hack
no_ico.webp 2018-11-21 19:50:05 Vision Direct Customer Card Details Stolen (lien direct) In light of the news today that Vision Direct customer card details were stolen in a data hack with 16,300 customers at risk, please see below for comment from David Emm, Principal Security Researcher at Kaspersky Lab. David Emm, Principal Security Researcher at Kaspersky Lab: “Today's news of the Vision Direct breach – the data of which was obtained using a … The ISBuzz Post: This Post Vision Direct Customer Card Details Stolen Hack
ESET.webp 2018-11-21 10:00:00 Two Brits jailed for TalkTalk hack (lien direct) >The breach exposed the personal data of 160,000 people and cost the telecom company £77 million Hack
The_Hackers_News.webp 2018-11-21 08:15:02 Get paid up to $40,000 for finding ways to hack Facebook or Instagram accounts (lien direct) Here we have great news for all bug bounty hunters. Now you can get paid up to $40,000 for finding and responsibly reporting critical vulnerabilities in the websites and mobile applications owned by Facebook that could allow cyber attackers to take over user accounts. In the latest post published Tuesday on the Facebook page, the social networking giant announced that it has raised the Hack
MalwarebytesLabs.webp 2018-11-20 16:51:05 Web skimmers compete in Umbro Brasil hack (lien direct) In this web skimming match between two Magecart groups, there can only be one winner. Categories: Criminals Threat analysis Tags: (Read more...) Hack
SecurityAffairs.webp 2018-11-20 15:00:01 Two hackers involved in the TalkTalk hack sentenced to prison (lien direct) Two men from Tamworth, Staffordshire were sentenced to prison for their roles in the 2015 TalkTalk hack. Two men, Connor Allsopp, 21, and Matthew Hanley, 23, pleaded guilty to charges of hacking. Allsopp has been sentenced to 8 months in jail and Hanley to 12 months. In October 2015, TalkTalk Telecom Group plc publicly disclosed that four […] Hack Guideline
grahamcluley.webp 2018-11-20 13:13:04 Two friends jailed for TalkTalk hack plot (lien direct) Two friends jailed for TalkTalk hack plotJudge describes men connected to TalkTalk hack as “individuals of extraordinary talent.” Sigh… Read more in my article on the Hot for Security blog. Hack
ZDNet.webp 2018-11-19 18:17:02 Russia wants DNC hack lawsuit thrown out, citing international conventions (lien direct) Russian Federation says it benefits from the same legal protections as the US does when carrying out military cyberattacks. Hack
SecurityWeek.webp 2018-11-19 17:25:01 New Vehicle Hack Exposes Users\' Private Data Via Bluetooth (lien direct) People who have synced their mobile phones with a wide variety of vehicle infotainment systems may have have their personal information exposed to a new type of vehicle hack, security researchers say.  Hack
grahamcluley.webp 2018-11-19 17:12:02 Vision Direct hack reveals customer credit card details (lien direct) Vision Direct hack reveals customer credit card detailsCriminals planted credit-card skimming code on Vision Direct online store. Hack
BBC.webp 2018-11-19 16:44:00 (Déjà vu) TalkTalk hack attack: Friends jailed for cyber crimes (lien direct) Matthew Hanley, 23, and Connor Allsopp, 21, accessed customers' information during the cyber attack. Hack
BBC.webp 2018-11-19 11:44:04 Vision Direct hack puts customers\' money at risk (lien direct) Contact lens retailer says anyone who entered their details over a six-day period may be affected. Hack
Blog.webp 2018-11-18 18:13:02 (Déjà vu) Hack the Box: Jerry Walkthrough (lien direct) Hello CTF Crackers!! Today we are going to capture the flag on a Challenge named as “Jerry” which is available online for those who want to increase their skill in penetration testing and black box testing. Jerry is a retired vulnerable lab presented by 'Hack the Box' for making online penetration practices according to your... Continue reading → Hack
SecurityAffairs.webp 2018-11-18 13:20:00 6,500+ sites deleted after Dark Web hosting provider Daniel\'s Hosting hack (lien direct) On Thursday, November 15, hackers compromised Daniel’s Hosting, one of the largest Dark Web hosting provider, and deleted 6,500+ sites. On Thursday, November 15, hackers compromised Daniel’s Hosting, one of the largest Dark Web hosting provider. The news was confirmed by Daniel Winzen, the software developer behind the hosting service. Daniel’s Hosting became the largest Dark Web hosting provider earlier […] Hack
DarkReading.webp 2018-11-16 16:25:00 New Bluetooth Hack Affects Millions of Vehicles (lien direct) Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system. Hack
grahamcluley.webp 2018-11-14 14:44:00 Apple says nothing as Apple ID accounts mysteriously locked down (lien direct) Apple says nothing as Apple ID accounts mysteriously locked downHas someone been trying to hack into a large number of Apple ID accounts? Read more in my article on the Hot for Security blog. Hack
bleepingcomputer.webp 2018-11-14 12:03:00 Infowars Store Affected by Magecart Credit Card Stealing Hack (lien direct) A MageCart credit card skimming attack has been discovered on the online store for the Infowars web site. Visitors who purchased anything on the store while the malicious code was present, would have had their payment information sent to the attacker's server in Lithuania. [...] Hack
Kaspersky.webp 2018-11-13 14:39:01 Podcast: IoT Firms Face a \'Tidal Wave\' of Lawsuits, Attorney Explains (lien direct) An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future. Hack
SecurityAffairs.webp 2018-11-12 21:37:05 Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor (lien direct) The author of an IoT botnet is distributing a backdoor script for ZTE routers that also includes his own backdoor to hack script kiddies A weaponized IoT exploit script is being used by script kiddies, making use of a vendor backdoor account to hack the ZTE routers. Ironically, this is not the only backdoor in […] Hack
The_Hackers_News.webp 2018-11-12 04:55:01 New APIs Suggest WPA3 Wi-Fi Security Support Coming Soon to Windows 10 (lien direct) Windows 10 users don't have to wait much longer for the support of latest WPA3 Wi-Fi security standard, a new blog post from Microsoft apparently revealed. The third version of Wi-Fi Protected Access, in-short WPA3, is the next generation of the wireless security protocol that has been designed to make it harder for attackers to hack WiFi password. WPA3 was officially launched earlier this Hack
SecurityAffairs.webp 2018-11-10 14:47:00 (Déjà vu) Symantec shared details of North Korean Lazarus\'s FastCash Trojan used to hack banks (lien direct) North Korea-linked Lazarus Group has been using FastCash Trojan to compromise AIX servers to empty tens of millions of dollars from ATMs. Security experts from Symantec have discovered a malware, tracked as FastCash Trojan, that was used by the Lazarus APT Group, in a string of attacks against ATMs. The ATP group has been using this malware […] Malware Hack Medical APT 38
Blog.webp 2018-11-09 18:52:00 Hack the Raven: Walkthrough (CTF Challenge) (lien direct) Hello everyone and welcome to yet another CTF challenge walkthrough. This time we'll be putting our hands on Raven. Raven is a Beginner/Intermediate boot2root machine. There are two intended ways of getting root and we demonstrate both of the ways in this article. Table of contents: (Method 1) Port scanning and IP discovery. Hitting on port... Continue reading → Hack
grahamcluley.webp 2018-11-08 12:20:02 Smashing Security #103: An Instagram nightmare, crazy iPhone deaths, and election hack claims (lien direct) Smashing Security #103: An Instagram nightmare, crazy iPhone deaths, and election hack claimsOne travel blogger finds you don't have to be Kylie Jenner to be targeted by an Instagram hacker. When 40 iPhones at a hospital mysteriously die, what could be the explanation? And, surprise surprise, political parties in the USA are throwing around hacking accusations. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Naked Security's Mark Stockley. Hack
Last update at: 2024-07-04 12:07:27
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter