Hacking News

Latest hacking information from the underworld

GCHQ’s cybersecurity accelerator opened nine new startups

It’s the second intake of startups for the GCHQ cyber-accelerator in Cheltenham, which saw the number of applications to be a part of the scheme double compared with its first incarnation. “There’s a bunch of problems out there and we want solutions to them. That’s what we hope we’ve got with the companies that we’ve […]

GCHQ’s cybersecurity accelerator opened nine new startups Read More »

Language bugs infest downstream software

Arnaboldi found bugs in the major programming languages JavaScript, Perl, PHP, Python and Ruby, and in all cases, he said the vulnerabilities could expose software written using those languages. To run his test, Arnaboldi created a differential fuzzer, XDiFF, which compares behaviour of different inputs, versions, implementations and operating system implementations of the same piece

Language bugs infest downstream software Read More »

Finance minister wants to “wipe out Rizal Bank from Earth”

Bangladesh’s finance minister has said he wants to “wipe out” the Philippines bank linked to a cyberattack that left the country’s central bank $81 million out of pocket. As reported by the Dharka Tribune, the Bangladesh government is considering lodging a court case against Rizal Bank, which was used to funnel the proceeds stolen from

Finance minister wants to “wipe out Rizal Bank from Earth” Read More »

Keylogger uncovered on hundreds of HP PCs

Hewlett Packard has issued an emergency patch to resolve a driver-level keylogger discovered on hundreds of HP laptops. The bug was discovered by Michael Myng, also known as “ZwClose.” The security researcher was exploring the Synaptics Touchpad SynTP.sys keyboard driver and how laptop keyboards were backlit and stumbled across code which looked suspiciously like a

Keylogger uncovered on hundreds of HP PCs Read More »

Dynamics 365 sandbox leaked TLS certificates

Matthias Gliwka, a Stuttgart-based software developer, discovered the slip while working with the cloud version of Redmond’s ERP system. Writing at Medium, Gliwka said the TLS certificate was exposed in the Dynamics 365 sandbox environment, designed for user acceptance testing. Unlike the development and production servers, the sandbox gives admins RDP access, and “that’s where

Dynamics 365 sandbox leaked TLS certificates Read More »

Bio-metrics isn’t the answer against financial fraud

Currently, when money is transferred it gets lodged in batches that go through a clearing house, with the big four banks in Australia running their own batch clearing practice; there is also a collection of second-tier clearing houses that perform transaction clearing. These transactions are held for a number of hours to allow batch analytics

Bio-metrics isn’t the answer against financial fraud Read More »

8 Low or No-Cost Sources of Threat Intelligence

Organizations know they need to get serious about threat intelligence, but it’s not always clear where to find credible information. While just about every security industry vendor website offers up information on the latest threats, some are better than others. Here, we ‘ll point out the sites that are the most informative and useful. Read

8 Low or No-Cost Sources of Threat Intelligence Read More »