Experts spotted a new strain of the Sage Ransomware that implements Anti-Analysis capabilities Security experts from Fortinet spotted a new...
Cisco Finally Patches 0-Day Exploit - CVE-2017-3881
Cisco Finally Patches 0-Day Exploit - CVE-2017-3881 Cisco Systems has finally released an update for its IOS and IOS XE software to address...
Connect wireless (wifi) via command line (cli) on boot - Ubuntu 14.04 onwards
Connect wireless (wifi) via command line (cli) on boot - Ubuntu 14.04 onwards Needed my home base server to connect to wireless / wifi on b...
rpm / yum command cheat sheet - Redhat / Centos
rpm / yum command cheat sheet - Redhat / Centos rpm command cheat sheet for Linux rpm is a powerful Package Manager for Red Hat, Suse and ...
FireEye releases GoCrack, a free managed Password Cracking Tool
FireEye releases GoCrack, a free managed Password Cracking Tool Early this week FireEye released a managed password cracking tool, dubbed G...
FireEye releases GoCrack, a free managed Password Cracking Tool
FireEye releases GoCrack, a free managed Password Cracking Tool Early this week FireEye released a managed password cracking tool, dubbed G...
Vulnerabilities in Google Issue Tracker exposed details about unpatched flaws
Vulnerabilities in Google Issue Tracker exposed details about unpatched flaws A flaw in the Google Issue Tracker, also known as the “Bugani...
Gaza Cybergang is back, it leverages new tools against new targets
Gaza Cybergang is back, it leverages new tools against new targets Gaza Cybergang threat actor it is back again, this time it is targeting ...
Gaza Cybergang is back, it leverages new tools against new targets
Gaza Cybergang is back, it leverages new tools against new targets Gaza Cybergang threat actor it is back again, this time it is targeting ...
Investigation Underway at Heathrow Airport After USB Drive Containing Sensitive Security Documents Found on...
Investigation Underway at Heathrow Airport After USB Drive Containing Sensitive Security Documents Found on... Security personnel at Heathr...
iPhone Apps you granted camera access can secretly take photos and record video
iPhone Apps you granted camera access can secretly take photos and record video A serious privacy issue in iPhone that could be exploited b...
New Dutch legal framework could cause Mozilla to take off the Dutch CA from its trust list.
New Dutch legal framework could cause Mozilla to take off the Dutch CA from its trust list. Mozilla would remove the Dutch CA, the CA of th...
New Dutch legal framework could cause Mozilla to take off the Dutch CA from its trust list.
New Dutch legal framework could cause Mozilla to take off the Dutch CA from its trust list. Mozilla would remove the Dutch CA, the CA of th...
Industrial Products of many vendors still vulnerable to KRACK attack
Industrial Products of many vendors still vulnerable to KRACK attack Many industrial networking devices from various vendors are still vuln...
Hashcat 4.0.0 now can crack passwords and salts up to length 256
Hashcat 4.0.0 now can crack passwords and salts up to length 256 The new version of the tool, Hashcat 4.0.0 release is now available and in...
The State Of Application Security [ Infographic ]
The State Of Application Security [ Infographic ] Read More At -> https://blog.cripperz.sg/2017/05/07/state-application-security-infog...
How HoneyPot works & How to setup / avoid them.
How HoneyPot works & How to setup / avoid them. It’s a question fit for networking teams, security teams, and especially CISOs, which i...
Meet New Shodan Malware Scanner - Scans for C&C Servers
Meet New Shodan Malware Scanner - Scans for C&C Servers So what is SHODAN? Meet “Shodan” The Scariest Search Engine On The Interne...
Matrix Ransomware being distributed through malvertising
Matrix Ransomware being distributed through malvertising Security expert Jérôme Segura from Malwarebytes has spotted that Matrix Ransomware...
IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsat’s SATCOM systems
IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsat’s SATCOM systems Flaws in Stratos Global AmosConnect 8 ...
Security Affairs newsletter Round 134 – News of the week
Security Affairs newsletter Round 134 – News of the week A new round of the weekly SecurityAffairs newsletter arrived! The best news of the...
Basetools underground hacking forum breached, hacker demands $50K ransom
Basetools underground hacking forum breached, hacker demands $50K ransom Basetools underground hacking forum was breached, hackers demand a...
Mysterious hack allows attackers stealing Windows login credentials without user interaction
Mysterious hack allows attackers stealing Windows login credentials without user interaction Microsoft fixed a vulnerability that could all...
Documents encrypted by Bad Rabbit ransomware could be recovered without paying ransom
Documents encrypted by Bad Rabbit ransomware could be recovered without paying ransom Files Encrypted by Bad Rabbit Recoverable Without Pay...
CSE Malware ZLab – Preliminary analysis of Bad Rabbit attack
CSE Malware ZLab – Preliminary analysis of Bad Rabbit attack We at the CSE Cybsec ZLab have conducted a preliminary analysis of the Bad Rab...
Kaspersky: Hackers used backdoored MS Office key-gen to steal NSA exploits
Kaspersky: Hackers used backdoored MS Office key-gen to steal NSA exploits According to Kaspersky, the PC was hacked after the NSA employee...
Krebs reported that Dell lost Control of dellbackupandrecoverycloudstorage Domain in June 2017
Krebs reported that Dell lost Control of dellbackupandrecoverycloudstorage Domain in June 2017 The popular investigator Brian Krebs reporte...
Microsoft releases the open-source scanning tool Sonar
Microsoft releases the open-source scanning tool Sonar Microsoft announced the availability of Sonar, an open source linting and website sc...
Hackers broke into the celeb London Bridge Plastic Surgery clinic
Hackers broke into the celeb London Bridge Plastic Surgery clinic The celeb London Bridge Plastic Surgery clinic confirmed in a statement t...
No Space Left On Device - Ubuntu / Linux
No Space Left On Device - Ubuntu / Linux It's quite easy for a disk to have a large number of inodes used even if the disk is not very ...
Digging the Middle East and North African cybercrime underground market
Digging the Middle East and North African cybercrime underground market Security experts from Trend Micro have published an interesting rep...
Speedtest Bash Script Linux
Speedtest Bash Script Linux A simple benchmark script that shows download and upload speed for multiple locations around the world, CPU spe...
UK Government links the WannaCry attack that crippled NHS to North Korea
UK Government links the WannaCry attack that crippled NHS to North Korea UK Government blamed North Korea for the WannaCry attack that affe...
A new Ursnif Banking Trojan campaign targets Japan
A new Ursnif Banking Trojan campaign targets Japan Crooks continues to target Japanese users, now the hackers leverage the Ursnif banking T...
Here's what happens inside Amazon when one of its AWS hosting services goes down
Here's what happens inside Amazon when one of its AWS hosting services goes down In late February 2017, a number of large websites ...
South Africa – About 30-million identity numbers and other personal and financial information leaked online
South Africa – About 30-million identity numbers and other personal and financial information leaked online South Africa – About 30-million...
The Necurs botnet is back spreading a downloader with new interesting features
The Necurs botnet is back spreading a downloader with new interesting features The Necurs botnet is spreading a new downloader that takes s...
BAE Systems report links Taiwan heist to North Korean LAZARUS APT
BAE Systems report links Taiwan heist to North Korean LAZARUS APT Researchers at BAE Systems investigated the recent cyber-heist that targe...
CUTLET MAKER ATM malware offered for 5000 USD on darknet forum
CUTLET MAKER ATM malware offered for 5000 USD on darknet forum Hacking ATM could be very easy thanks to the availability of the CUTLET MAKE...
Physical To Virtual (P2V) Windows Migration All Version - Virtualbox / VMware / Hyper-V / Citrix hack
Physical To Virtual (P2V) Windows Migration All Version - Virtualbox / VMware / Hyper-V / Citrix hack I was working on to migrate an ol...
This Guy Has the Fastest Home Internet in the United States
This Guy Has the Fastest Home Internet in the United States Five ISPs offer 10 gigabit per second internet connections. So far, it looks ...
Deliver Your Parcel Around Singapore For Just SGD5 NETT
Deliver Your Parcel Around Singapore For Just SGD5 NETT Often see online blogshop owners seeking delivery guys on Facebook. Well, Easy ...
ROCA vulnerability (CVE-2017-15361) allows attackers to recover users Private RSA Keys
ROCA vulnerability (CVE-2017-15361) allows attackers to recover users Private RSA Keys ROCA vulnerability (CVE-2017-15361) allows attackers...
Cyberespionage group stolen Microsoft vulnerabilities DB back in 2013
Cyberespionage group stolen Microsoft vulnerabilities DB back in 2013 Another day, another news about a clamorous data breach, this time th...
BlackOasis APT leverages new Flash zero-day exploit to deploy FinSpy
BlackOasis APT leverages new Flash zero-day exploit to deploy FinSpy Security researchers from Kaspersky Labs spotted the BlackOasis APT gr...
Even With The Best Email Spoofing Defences in The World, HMRC is Spoofed
Even With The Best Email Spoofing Defences in The World, HMRC is Spoofed Even with the most advanced email protections in place and an enti...
Cryptocurrency mining affects over 500 million people. And they have no idea it is happening.
Cryptocurrency mining affects over 500 million people. And they have no idea it is happening. This autumn the news spread that some website...
Wifi networks are vulnerable to hacking WPA KRACK attack
Wifi networks are vulnerable to hacking WPA KRACK attack The KRACK attack allows an attacker to decrypt information included in protected W...
Pizza Hut notifies card breach while users have already reported fraudulent transactions
Pizza Hut notifies card breach while users have already reported fraudulent transactions Pizza Hut U.S. notified customers over the weekend...
Linux kernel affected by a local privilege escalation vulnerability
Linux kernel affected by a local privilege escalation vulnerability Cisco issued a security advisory on a local privilege escalation vulner...