Source: National Cyber Security – Produced By Gregory Evans The US intelligence community is still attempting to figure out how a hacking group called the Shadow Brokers was able to obtain and leak a slew of NSA computer exploits used to circumvent security of routers and firewalls, top officials The…
ALLEGED NSA HACKERS PROBABLY GAVE AWAY A SMALL FORTUNE BY LEAKING EXPLOITS
Source: National Cyber Security – Produced By Gregory Evans Each of the zero-day exploits could have sold for over $100,000 or more in the black market Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly The…
Obama Lets NSA Use Zero-Day Exploits by labeling it as ‘National Security Need’
Source: National Cyber Security – Produced By Gregory Evans On Saturday, the Senior Administration Officials cast light on the subject of Internet Security and said President Obama has clearly decided that whenever the U.S. Intelligence agency like NSA discovers major vulnerabilities, in most of the situations the agency should reveal…
New free tool detects Hacking Team exploits
Source: National Cyber Security – Produced By Gregory Evans A security company has released a free tool to users who suspect they may be a victim of Hacking Team’s exploit cache. Hacking Team is a secretive Milan-based firm which specializes in the sale of surveillance tools, malware and exploits to…
Cyberspies love exploits from Hacking Team leak
Source: National Cyber Security – Produced By Gregory Evans The leaked files from surveillance software maker Hacking Team have proven to be a great resource for cyberespionage groups, which have used at least two Flash Player exploits from the company’s arsenal. Last Tuesday, security researchers from security firm FireEye detected…
New Hacker Tool iDict Exploits Simple Passwords: How To Find Out If Your Account Could Be Compromised
If your password is simple — like Password1 or Passw0rd — now’s the time to change it, as a new brute-force hacking tool called iDict made its way around the Internet Friday. iDict exploited a hole in Apple’s security system […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Former world’s most wanted hacker Kevin Mitnick now sells zero-day exploits
Kevin Mitnick, a famous (former) hacker who is now a security consultant, has ventured into a new business: buying and selling high-end zero-day exploits. Dubbed Absolute Zero Day Exploit Exchange, the six-month-old service sells exclusive unpatched exploits to corporate as […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Bitcoin Malware Attack Exploits Russia-Ukraine Crisis
Source: National Cyber Security – Produced By Gregory Evans A hacker group is trying to leverage the ongoing conflict between Russia and Ukraine as it distributes malware that is capable of targeting bitcoin wallets. A report by Bitdefender Labs, a cybersecurity firm that focuses on the digital currency market, […]…
Snapchat exploits published by snubbed researchers
After months of being ignored by the company behind the popular instant messaging app Snapchat, Australian hackers Gibson Security has finally published exploits that they discovered. The exploits could be used to match names and phone numbers on Snapchat. Additionally, unscrupulous hackers could also use the exploits to create thousands of…
CDI 2012 – SEC504 – Hacker Techniques, Exploits & Incident Handling
SANS is offering 1 course(s) at this training event being held in 201212 – SEC504, DC US starting on December 9, 2012. Please visit http://www.sans.org/event/29165 for complete information and to register for this event. View full post on SANS Institute – ALL Training Events For more information go to http://www.NationalCyberSecurity.com,…