Forrester, one of the most influential research and advisory firms was hacked

Forrester Research announced today that Forrester.com experienced a security breach this week, attackers were ultimately detected and shut out of the system Forrester, one of the most influential research and advisory firms in the world, revealed on Friday to have suffered a security breach the past week. The attackers broke into the infrastructure hosting the Forrester.com […]

Leading research and advisory firms Forrester was hacked

Forrester the most leading research and advisory firm in the world announced that Forrester.com experienced a Security Breach last Friday. Hackers defaced into their website(Forrester.com) and download research reports that are made available for their clients.The advisory firm supports decision makers of its customers by giving patterns, statistics, and other market analysis. Steven Peltzman, Forrester’s […]

Intezer researchers link CCleaner hack to Chinese APT17 hackers

Researchers from security firm Intezer speculate that the attack was powered by nation-state actor, likely the Chinese APT17 group. Security experts continue to investigate the recent attack against the supply chain of the popular software CCleaner. The hackers first compromised in July a CCleaner server, then exploited it to deliver a backdoored version of the 32-bit CCleaner v5.33.6162 […]

Researchers Link CCleaner Hack to Cyberespionage Group

Experts believe a state-sponsored hacker was behind the attack, which affected 2.2 million people. The recent attack that resulted in 2.2 million users installing infected versions of a popular Windows system optimization tool might have been the work of a sophisticated cyberespionage group with a history of software supply chain compromises. Researchers from two security companies […]

Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues

Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal funds. In June 2016, researchers with Positive Technologies demonstrated that it is possible to hack Facebook accounts by knowing phone numbers by exploiting a flaw in the SS7 protocol. The technique allows bypassing any security measure […]

Researchers Discover New Android Banking Trojan

Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution. According to a report shared with Bleeping Computer before publication, security researchers from SfyLabs first saw ads for this trojan on a hacking […]

Fitbit’ Fitness Tracker Devices Leak Personal Data: Researchers

We do know that the inherent flaws in wearable devices especially the fitness trackers can prove to be detrimental to our security because of the nature of data these devices register. Since these devices provide information like calories burned, heart rate, sleep duration, and miles walked, therefore, these are becoming increasingly popular among fitness enthusiasts […]

Second Researcher Drops Router Exploit Code After D-Link Mishandles Bug Reports

Embedi, a hardware security firm, has published details about two vulnerabilities that have yet to be patched in the firmware of D-Link routers. This marks the second incident of this sort in the last five days. Last Friday, South Korean security researcher Pierre Kim also published public detailsabout ten unpatched vulnerabilities in D-Link routers. The researcher […]

Researchers Reveal New Toast Overlay Attack on Android Devices

Mobile security experts from Palo Alto Networks have detailed a new attack on Android devices that uses “Toast” notifications to help malware in obtaining admin rights or access to Android’s Accessibility service — often used to take over users’ smartphones. During the past few years, most of the top Android malware has used the same […]

Researchers Hack Voting Machines Used in German Elections

Voting machines used to tally and aggregate votes in multiple German states are vulnerable to a wide array of vulnerabilities that researchers say can be exploited to alter election results without too much effort. The flaws came to light today when three members of the Chaos Computer Club (CCC) — a club of white hat […]

New ESET research uncovers Gazer, the stealthy backdoor that spies on embassies

Security researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research team are the first in the world to document the advanced backdoor malware, which they have named “Gazer”, despite evidence that […]

Researchers bought MacBook for $1 using critical vulnerabilities

Why buy expensive MacBook Pro when you can get it for $1? But then you will be the bad guy. The IT security researchers at ERPScan discovered a bunch of critical vulnerabilities in SAP Point-of-Sales systems (SAP POS), a client/server point-of-sale (POS) solution allowing them to buy an expensive MacBook for just $1. According to […]

Researchers Encode Physical DNA with Malware To infect Computers

When DNA was synthesized, nobody had thought that it could be used to spread computer viruses, but a group of researchers from the University of Washington’s school of computer science and engineering have come up with a surprising new research. According to the research team, it is indeed possible to insert malicious malware into the […]

Hero Researcher Who Halted WannaCry Ransomware Arrested by FBI

An IT security researcher going by the Twitter handle of @MalwareTechBlog (real name Marcus Hutchins) has been detained by the law enforcement authorities in the United States. Hutchins, who is visiting States to attend Defcon, one of the world’s largest hacker conventions in Las Vegas, Nevada was arrested for unknown reasons Hutchins is the researcher who “saved” the world […]

Your Web History Can Be Traced Even After Anonymity, According To Researchers

Short Bytes: A team of German researchers shared that an individual’s secret web history and habit can be traced. Surprisingly, even after it goes under anonymity, it can be revealed. Security experts Svea Eckert and Andreas Dewes did their research with 3 million Germans, out of which some were public personalities. You think nobody will get to […]

Hackers Leak Data From Mandiant Security Researcher in Operation #LeakTheAnalyst

Earlier today, a hacker group named 31337 Hackers has leaked personal details and files belonging to a security researcher working for Mandiant, FireEye’s breach investigation unit. The leak came to light today after hackers posted a  message on PasteBin. Two download links for the stolen data were included. The password-protected archives contained information taken from the security […]

Watch: Researcher hacking, unlocking a smart gun with $15 magnets

A $1500 smart gun developed with the main objective of reducing gun crime has an inherent security flaw, which is so huge that even $15 magnets can expose it. This smart gun model called Armatix IP1 allows the owner to open fire only if the company’s smartwatch near by the gun. However, the presence of such […]

Chinese Researchers Hack Tesla Model X in Impressive Video

Security researchers from Chinese security firm Tencent Keen Security Lab have found and helped fix several vulnerabilities in Tesla Model X cars that would have allowed an attacker to control the vehicle from a remote location. Keen Lab experts were able to control a stationary car’s lights, in-vehicle displays, and open its doors and trunk. […]

Security Researchers Reveal Cyber Espionage Attacks By Copykittens Hackers

Security researchers have discovered a new and massive cyber espionage campaign by copykittens hackers, especially aimed at people working in government organizations, defense, and academics from various countries. The campaign is conducted by a group of Iran-related threats whose activity, methods of attack and targets have been published in a detailed joint report published by […]