Posts From Shah Sheikh

WikiLeaks has published another Vault 7 leak where the CIA spy on video streams remotely. The document released by WikiLeaks states how the CIA agents use remote tool to stealthy collect RTSP/H.264 video streams and is called CouchPotato. RTSP (Real

Microsoft has released 48 security patches for all supported versions of Windows systems and other products today. The patches will cover vulnerabilities in Microsoft’s Windows operating system, Internet Explorer, Microsoft Edge, Microsoft SharePoint, Adobe Flash Player, Windows Hyper-V and Microsoft

Hotspot Shield, a virtual Private Network VPN service is been blamed for breaching its own privacy policy according to the Center for Democracy & Technology (CDT) which is a nonprofit organization group for consumer rights. CDT has filed a complaint

A numerous number of flaws/vulnerabilities have been found in an essential component of solar panels that can be exploited to cause widespread outages in European power grids. A cybersecurity researcher at Dutch security firm ITsec, William Westerhof, has discovered 21

Three security researchers have demonstrated at the Defcon in Las Vegas that infotainment systems from well-known automarks still have numerous vulnerabilities. Mickey Shkatov, Jesse Michael, and Oleksandr Bazhaniuk from the Advanced Threat Research team at McAfee have shown at DefCon

IP-enabled security cameras manufactured by Loftek and VStarcam are said to be infected by more than two dozen vulnerabilities thus exposing them to remote attacks. More than 1.3 million cameras are currently in use today, with more than 200,000 models

A cross-scripting vulnerability was discovered last year in two of IBM products, Worklight and MobileFirst. The vulnerability was recently fixed by IBM that could allow attackers to execute malicious JavaScript code in a victims’ browser to steal sensitive data. A

The ICS-CERT illustrated that flwas within Siemen’s molecular imaging products were exploitable while “Siemens is preparing updates for the affected products and recommends protecting network access to the Molecular Imaging products with appropriate mechanisms,” ICS-CERT said in its advisory. “It is

This week, Cisco has released patches for multiple vulnerabilities spanning across a dozen of its products which included two high severity vulnerabilties. The severe vulnerabilties couold allow an attacker to perform a DOS attack or bypass local authentication. The severe

In a press release published Thursday, WikiLeaks revealed the CIA’s hacking tool, ‘Dumbo,’ which allows agents to manipulate Microsoft Window’s webcams, microphones, and other devices from thousands of miles away. The Wikileaks report, part of its Vault 7 disclosures, stated

Over the past few years, it was known among cyber criminals that they would buy web extensions, modify them by injecting advertisements into websites to generate revenues. However, in recent events, it has become clear that hackers are currently shifting

Everybody in the cyber world is aware of the infamous WannaCry ransomware attack that occured not too long ago. More then 150 countries were affected including hospitals businesses and telecom providers who were asked to pay between 300-600 dollars for

As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or pentesters. The idea is the same: train the system/tool with quality base data, and make it able to both extrapolate

Kaspersky Lab experts have uncovered a new variant of the Svpeng mobile banking Trojan that features keylogging functionality, a technique more commonly associated with targeted threat actors. The modified Trojan steals entered text such as banking credentials by abusing Android’s

WikiLeaks claims that a source provided portions of an archive of the CIA’s hacking arsenal, including malware, viruses, trojans, weaponised “zero day” exploits and malware remote control systems that was circulated among former United States government hackers and contractors in

A team of security researchers at Google discovered and blocked a new family of Android malware developed by a cyber arms company that may have its roots in state-sponsored spying efforts. The malware could hijack a user’s email, SMS messages,