Monthly Archives: May 2019

Giga-hurts radio: Terrorists build Wi-Fi bombs to dodge cops’ cellphone jammers

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Terrorists have been caught strapping Wi-Fi-activated backup triggers to bombs in Indonesia, police claimed this week.

The explosives were discovered in a raid earlier this month, and included a switching mechanism that enabled them to be detonated using a signal […]

By |May 20th, 2019|Cyber News|

Office 365 user security practices are woeful, yet it’s still ‘Microsoft’s fault’ when an org is breached

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft’s Office 365 platform.

The UK’s National Cyber Security Centre (NCSC) made a similar appeal in December 2018. The […]

By |May 20th, 2019|Cyber News|

Account Hijacking Forum OGusers Hacked

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: krebsonsecurity

Oguserscom — a forum popular among people involved in hijacking online accounts and conducting SIM swapping attacks to seize control over victims’ phone numbers — has itself been hacked, exposing the email addresses, hashed passwords, IP addresses and private messages for nearly 113,000 […]

By |May 18th, 2019|Cyber News|

It’s 2019 so now security vulnerabilities are branded using emojis: Meet 😾😾😾, a Cisco router secure boot flaw

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Security weaknesses at the heart of some of Cisco’s network routers, switches, and firewalls can be exploited by hackers to hide spyware deep inside compromised equipment.

In order to exploit these flaws, dubbed 😾😾😾 or Thrangrycat by their discoverers, a miscreant or […]

By |May 14th, 2019|Cyber News|

It’s 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

A security flaw in WhatsApp can be, and has been, exploited to inject spyware into victims’ smartphones: all a snoop needs to do is make a booby-trapped voice call to a target’s number, and they’re in. The victim doesn’t […]

By |May 14th, 2019|Cyber News|

Another remote-code execution hole in top database engine SQLite: How it works, and why not to totally freak out

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Cisco Talos researchers have uncovered an SQLite use-after-free() vulnerability that could allow an attacker to, in theory, remotely execute code on an affected device.

“An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0,” said Talos […]

By |May 13th, 2019|Cyber News|

Baltimore hit with more ransomware, ChinaMobile gets the boot in the US, and another (mild) Systemd system-d’oh!

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register
Systemd, Linux, AMD and shoddy randomness
File this one under bad situations that probably don’t affect anyone.

It reemerged that some older generation AMD processors fail to generate random numbers after waking up from suspend, which has knock on effects into […]

By |May 13th, 2019|Cyber News|

Elite Russian Hackers Claim To Have Breached Three Major U.S. Antivirus Makers

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Forbes

There’s a never-ending game of cat and mouse between cybercriminals and the companies that develop anti-malware software. For three U.S.-based providers, it could get a lot more challenging. A group of elite Russian hackers claims to have infiltrated their networks […]

By |May 10th, 2019|Cyber News|

Want rootkit-level access without the hassle? Enter, LightNeuron for Exchange Server

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

A recently uncovered malware infection uses the basic functions of Microsoft’s Exchange Server to remotely monitor and control computer systems.

Researchers at ESET said this week the software nasty, known as LightNeuron, is particularly difficult for admins to detect as it […]

By |May 9th, 2019|Cyber News|

Airbnb host thrown in the clink after guest finds hidden camera inside Wi-Fi router

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

An Airbnb “superhost” has been arrested and jailed after a guest discovered a camera hidden inside an internet router placed in the bedroom.

The perv had picked on the wrong woman. Yunfei (her online alias) works in IT security and […]

By |May 9th, 2019|Cyber News|