Hackers exploited an Instagram flaw access celebrity profile data An Instagram flaw allowed hackers to access profile information for high-...
WikiLeaks – CIA used the AngelFire implant infect systems running Windows OSs
WikiLeaks – CIA used the AngelFire implant infect systems running Windows OSs A new batch of documents from CIA Vault 7 leaks revealed deta...
Expert discovered 2,893 Bitcoin miners left exposed on the Internet
Expert discovered 2,893 Bitcoin miners left exposed on the Internet The popular Dutch security researcher Victor Gevers has discovered thou...
APT group leverage Gazer backdoor to spy on embassies and consular operations
APT group leverage Gazer backdoor to spy on embassies and consular operations Security researchers at ESET have spotted a new cyber espiona...
Selena Gomez Instagram hacked! Hackers post Bieber nude photos
Selena Gomez Instagram hacked! Hackers post Bieber nude photos Selena Gomez Instagram account has reportedly been hacked. Nude photos of si...
Ramadan 2017: 9 questions about the Muslim holy month you were too embarrassed to ask
Ramadan 2017: 9 questions about the Muslim holy month you were too embarrassed to ask The Muslim holy month of Ramadan starts Friday evenin...
PHP 7 performance vs PHP 5.6 vs HHVM 3.7 [ Infographic ]
PHP 7 performance vs PHP 5.6 vs HHVM 3.7 [ Infographic ] Recently updated all my sites to get php7 working with Virtualmin GPL - guide post...
Upgrade php 5.5 to 5.6 & php7.0 in Ubuntu 14.04 LTS with Virtualmin via PPA
Upgrade php 5.5 to 5.6 & php7.0 in Ubuntu 14.04 LTS with Virtualmin via PPA PHP 5.5.9 comes default in Ubuntu 14.04 LTS and default...
Onliner Spambot – More than 711 Million email addresses open and accessible online
Onliner Spambot – More than 711 Million email addresses open and accessible online An archive containing more than 630 million email addres...
Swedish web hosting Loopia suffered severe data breach
Swedish web hosting Loopia suffered severe data breach The major Swedish web hosting provider Loopia has been compromised and the entire cu...
Android Banking Trojan MoqHao targets South Korea users
Android Banking Trojan MoqHao targets South Korea users Security researchers from McAfee have spotted a new Android banking Trojan dubbed M...
Experts found an undocumented Kill Switch in Intel Management Engine
Experts found an undocumented Kill Switch in Intel Management Engine Security researchers at Positive Technologies have discovered an undoc...
Hacking SAP POS systems with a $25 Raspberry Pi
Hacking SAP POS systems with a $25 Raspberry Pi A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a criti...
US CERT is warning of potential Hurricane Harvey Phishing Scams
US CERT is warning of potential Hurricane Harvey Phishing Scams After the Hurricane Harvey hit Texas causing deaths and destructions, autho...
India and Pakistan hit by state-sponsored cyber espionage campaign
India and Pakistan hit by state-sponsored cyber espionage campaign The security firm Symantec has discovered another cyber espionage campai...
Popular Sarahah App secretly uploads your phone contacts to the company’s servers
Popular Sarahah App secretly uploads your phone contacts to the company’s servers According to a report published by The Intercept, the pop...
List of 24 Hours Clinic In Singapore
List of 24 Hours Clinic In Singapore Just saving this list for myself, i guess others might find it useful too. Feel like you’re comin...
Philippines Under ISIS Attack #prayformarawi #prayforMarawiCity
Philippines Under ISIS Attack #prayformarawi #prayforMarawiCity #prayformarawi #prayforMarawiCity - Alleged ISIS members/Maute Group a...
Newly Found Malware Uses 7 NSA Tools, #Wannacry Only uses 2 - #EternalRocks Worm
Newly Found Malware Uses 7 NSA Tools, #Wannacry Only uses 2 - #EternalRocks Worm A security researcher has identified a new strain of malwa...
Chinese APT17 group leverages fake Game of Thrones leaks as lures
Chinese APT17 group leverages fake Game of Thrones leaks as lures Researchers at Proofpoint spotted a cyber espionage campaign leveraging r...
Google mistake is the root cause of Internet Outage in Japan
Google mistake is the root cause of Internet Outage in Japan A widespread internet disruption occurred in Japan on Friday, Google error it ...
Zimperium researcher released an iOS Kernel Exploit PoC
Zimperium researcher released an iOS Kernel Exploit PoC Zimperium Researcher Adam Donenfeld released an iOS Kernel Exploit PoC that can be ...
Tor relay of a Brazilian University was banned after harvesting .onions
Tor relay of a Brazilian University was banned after harvesting .onions The Tor relay of a Brazilian University was banned by the Tor admin...
Security Affairs newsletter Round 125 – News of the week
Security Affairs newsletter Round 125 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
Defray Ransomware used in targeted attacks on Education and Healthcare verticals
Defray Ransomware used in targeted attacks on Education and Healthcare verticals Researchers at Proofpoint spotted Defray Ransomware, a new...
More than 1,700 valid Telnet credentials for IoT devices leaked online
More than 1,700 valid Telnet credentials for IoT devices leaked online Security researchers are warning of the availability online of a lis...
Watcho ut! Adware spreading via Facebook Messenger
Watcho ut! Adware spreading via Facebook Messenger Security experts from Kaspersky Lab have spotted an ongoing cross-platform malware campa...
#WannaCry — Decrypting files with #WanaKiwi + Demos (Video) Free
#WannaCry — Decrypting files with #WanaKiwi + Demos (Video) Free DO NOT REBOOT your infected machines and TRY wanakiwi ASAP*! *ASAP becaus...
#Windows MS17-010 #EternalBlue SMB Exploit module for #Metasploit
#Windows MS17-010 #EternalBlue SMB Exploit module for #Metasploit Someone has just released #Windows MS17-010 #EternalBlue SMB Exploit modu...
Syslog / Rsyslog rotate daily at different directory mount device
Syslog / Rsyslog rotate daily at different directory mount device Here is a working config of rsyslog and logrotate in Redhat Linux, rotati...
Cisco IOS vulnerabilities open Rockwell Industrial Switches to attacks
Cisco IOS vulnerabilities open Rockwell Industrial Switches to attacks Vulnerabilities in Cisco IOS expose Rockwell Allen-Bradley Stratix a...
Mobile Trojan Development Kits allow creating ransomware without the need to write code
Mobile Trojan Development Kits allow creating ransomware without the need to write code Researchers at Symantec have discovered Trojan Deve...
Zerodium payouts for Messaging, Email App Exploits are $500,000
Zerodium payouts for Messaging, Email App Exploits are $500,000 Zerodium payouts include up to $500,000 for RCE and privilege escalation vu...
WikiLeaks – CIA used ExpressLane to covertly collect data from liaison intel services
WikiLeaks – CIA used ExpressLane to covertly collect data from liaison intel services WikiLeaks – CIA used ExpressLane to covertly collect ...
Meet a new friend with Grab and Tinder!
Meet a new friend with Grab and Tinder! Read More At -> https://blog.cripperz.sg/2017/05/15/meet-new-friend-grab-tinder/
After the kill switch, Now WannaCry 2.0 is out in the wild - It's not over.
After the kill switch, Now WannaCry 2.0 is out in the wild - It's not over. https://blog.cripperz.sg/2017/05/13/remove-wannacrypt-wcry-...
How to pronounce GIF ? - Creator of the GIF says it is pronounced "Jif"
How to pronounce GIF ? - Creator of the GIF says it is pronounced "Jif" Steve Wilhite made the controversial declaration duri...
Ropemaker attack allows to transform email in malicious ones after it’s received
Ropemaker attack allows to transform email in malicious ones after it’s received The Ropemaker attack allows hackers to turn an apparently ...
Fancy Bears release data on soccer players’ TUE drug use and doping cases
Fancy Bears release data on soccer players’ TUE drug use and doping cases Russia-linked hackers Fancy Bears claimed that around 160 footbal...
Fappening 2017 – Private pictures of Miley Cyrus, Stella Maxwell, and others leaked
Fappening 2017 – Private pictures of Miley Cyrus, Stella Maxwell, and others leaked Fappening 2017 – Private pictures of Miley Cyrus, Stell...
Neptune exploit kit used to deliver Monero cryptocurrency miners via malvertising
Neptune exploit kit used to deliver Monero cryptocurrency miners via malvertising According to a new report published by FireEye, crooks ha...
USS John S McCain incident, some experts speculate it was a cyber attack
USS John S McCain incident, some experts speculate it was a cyber attack On Monday, the USS John S McCain collided a Liberian-flagged tanke...
Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket
Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security researchers discovered t...
Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread
Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread A new fileless miner dubbed CoinMiner appeared in the wild, ...
How to remove WannaCrypt / WCry Ransomware (Video)
How to remove WannaCrypt / WCry Ransomware (Video) How to Remove WannaCryptor WCRY [SOLVED] Wanna Cry / WannaCrypt ransom ware took the i...
Cisco Finally Patches 0-Day Exploit - CVE-2017-3881
Cisco Finally Patches 0-Day Exploit - CVE-2017-3881 Cisco Systems has finally released an update for its IOS and IOS XE software to address...
Connect wireless (wifi) via command line (cli) on boot - Ubuntu 14.04 onwards
Connect wireless (wifi) via command line (cli) on boot - Ubuntu 14.04 onwards Needed my home base server to connect to wireless / wifi on b...
Experts at ZDI reported two critical Zero-Day flaws in Foxit PDF Reader
Experts at ZDI reported two critical Zero-Day flaws in Foxit PDF Reader Experts found two critical zero-day flaws in the Foxit PDF Reader t...
Ourmine hacked PlayStation Social Media Accounts to announce the theft of PSN Database
Ourmine hacked PlayStation Social Media Accounts to announce the theft of PSN Database Ourmine hacker crew hijacked the official Twitter an...
How to enable remote RDP access in Windows 10 Home edition | How to Allow Multiple RDP Sessions in Windows 10
How to enable remote RDP access in Windows 10 Home edition | How to Allow Multiple RDP Sessions in Windows 10 The Remote Desktop Connection...