Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

US Air Force probes targeted malware attack, blames… er, the US Navy? What?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The US Air Force has opened an investigation into a “malware” infection – which it is blaming on lawyers employed by the US Navy who are working on a war crimes case.

The bizarre case hinges around an alleged attempt […]

By |May 23rd, 2019|Cyber News|

Bug-hunter reveals another ‘make me admin’ Windows 10 zero-day – and vows: ‘There’s more where that came from’

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

A bug-hunter who previously disclosed Windows security flaws has publicly revealed another zero-day vulnerability in Microsoft’s latest operating systems.

The discovered hole can be exploited by malware and rogue logged-in users to gain system-level privileges on Windows 10 and recent […]

By |May 23rd, 2019|Cyber News|

Sophos tells users to roll back Microsoft’s Patch Tuesday run if they want PC to boot

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Brit security software slinger Sophos has advised its customers to uninstall Microsoft’s most recent Patch Tuesday run – the same patches that protect PCs and servers against the latest Intel cockups.

In an advisory note published over the weekend, Sophos admitted the latest […]

By |May 23rd, 2019|Cyber News|

Boeing admits 737 Max sims didn’t accurately reproduce what flying without MCAS was like

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Boeing has admitted that pilot training simulators for the controversial 737 Max did not accurately reproduce what happened if the infamous MCAS system went gaga.

In a statement, the American aircraft manufacturer said it had “made corrections to the 737 […]

By |May 23rd, 2019|Cyber News|

Giga-hurts radio: Terrorists build Wi-Fi bombs to dodge cops’ cellphone jammers

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Terrorists have been caught strapping Wi-Fi-activated backup triggers to bombs in Indonesia, police claimed this week.

The explosives were discovered in a raid earlier this month, and included a switching mechanism that enabled them to be detonated using a signal […]

By |May 20th, 2019|Cyber News|

Office 365 user security practices are woeful, yet it’s still ‘Microsoft’s fault’ when an org is breached

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft’s Office 365 platform.

The UK’s National Cyber Security Centre (NCSC) made a similar appeal in December 2018. The […]

By |May 20th, 2019|Cyber News|

Account Hijacking Forum OGusers Hacked

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: krebsonsecurity

Oguserscom — a forum popular among people involved in hijacking online accounts and conducting SIM swapping attacks to seize control over victims’ phone numbers — has itself been hacked, exposing the email addresses, hashed passwords, IP addresses and private messages for nearly 113,000 […]

By |May 18th, 2019|Cyber News|

It’s 2019 so now security vulnerabilities are branded using emojis: Meet 😾😾😾, a Cisco router secure boot flaw

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Security weaknesses at the heart of some of Cisco’s network routers, switches, and firewalls can be exploited by hackers to hide spyware deep inside compromised equipment.

In order to exploit these flaws, dubbed 😾😾😾 or Thrangrycat by their discoverers, a miscreant or […]

By |May 14th, 2019|Cyber News|

It’s 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

A security flaw in WhatsApp can be, and has been, exploited to inject spyware into victims’ smartphones: all a snoop needs to do is make a booby-trapped voice call to a target’s number, and they’re in. The victim doesn’t […]

By |May 14th, 2019|Cyber News|

Another remote-code execution hole in top database engine SQLite: How it works, and why not to totally freak out

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Cisco Talos researchers have uncovered an SQLite use-after-free() vulnerability that could allow an attacker to, in theory, remotely execute code on an affected device.

“An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0,” said Talos […]

By |May 13th, 2019|Cyber News|