Hacking News

Latest hacking information from the underworld

Hacker Bypasses Microsoft ATA for Admin Access

Microsoft’s Advanced Threat Analytics (ATA) platform for detecting cyberattacks can be evaded by attackers to achieve organizational control, a security researcher has discovered. ATA works by reading information from multiple sources: Windows Event Logs, SIEM events, and certain protocols to the Domain Controller. When communication to the Domain Control is done using protocols like Kerberos,

Hacker Bypasses Microsoft ATA for Admin Access Read More »

FIN10 Threat Actors Hack and Extort Canadian Mining, Casino Industries

A marauding group of threat actors dubbed FIN10 has extorted hundreds of thousands of dollars in bitcoins from Canadian companies in a cybercrime campaign that appears to have started at least as far back as 2013. Security vendor FireEye on Friday released a report describing the group’s activities and warning about active cyber-extortion campaigns against

FIN10 Threat Actors Hack and Extort Canadian Mining, Casino Industries Read More »

Senators Say Cybersecurity Should be Top Priority for Autonomous Vehicles

The arrival of autonomous vehicles (AV, or self-driving vehicles) on the public highways is getting closer. Just this month (June 2017), Nutonomy announced a partnership with Lyft for R&D on its existing AV testing on the streets of Boston. Lyft announced yesterday that by 2025 it will provide “at least 1 billion rides per year using

Senators Say Cybersecurity Should be Top Priority for Autonomous Vehicles Read More »

U.S Govt Forced us to Build Backdoor in our App says Pavel Durov, Founder of Telegram

Pavel Durov claimed on Twitter on Wednesday that US bureaus made two attempts to bribe his developers while they were on a one-week trip to the US last year. He also insisted that the FBI put pressure on him personally. “During our team’s 1-week stay in the US last year we had two attempts to

U.S Govt Forced us to Build Backdoor in our App says Pavel Durov, Founder of Telegram Read More »

Users will be fined by ISPs if they download pirated content over torrent network

For the past several years, anti-piracy Company Rightscorp has been moderately successful in forcing smaller margin ISPs in the United States to collaborate in a low-tier copyright trolling operation. The way it operates is relatively simple. Rightscorp monitors BitTorrent networks, obtains the IP addresses of alleged infringers, and gives DMCA notices to their ISPs. Rightscorp

Users will be fined by ISPs if they download pirated content over torrent network Read More »

Brit hacker admits he siphoned info from US military satellite network

A UK-based computer hacker has admitted stealing hundreds of usernames and email addresses from a US military communications system. Sean Caffrey, 25, of Sutton Coldfield in the West Midlands, broke in and pinched the ranks, usernames and email addresses of more than 800 users of a satellite communications system and of about 30,000 satellite phones,

Brit hacker admits he siphoned info from US military satellite network Read More »

Erosion of ISP Privacy Rules Sparks New Anti-Snooping Efforts

Since Congress voted to prevent the implementation of new ISP privacy protections there has been a committed and sometimes loud call for new rules. The fear is, without adequate safeguards in place, ISPs will be free to build detailed customer profiles that include names, addresses and online activities. That data can then be sold to,

Erosion of ISP Privacy Rules Sparks New Anti-Snooping Efforts Read More »