Posts From Mo Moin

A white hat hacker discovered how to break Tchap, a new secure messaging app launched by the French government for officials and politicians. The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to break into Tchap, a

The weather channel hit with a ransomware attack on its own network stop’s the live Broadcasting and down the website about 90 minutes On Thursday morning, from 6AM to 7:39AM. The Weather Channel (TWC) is an American pay television channel

BitDam launches a free Email Security Penetration Testing tool to determine the organization’s security posture against advanced threats. The Email accounts are the tempting targets for hackers, they find every possible way to infiltrate your email accounts as they are

Other problems for Facebook that admitted to have stored millions of Instagram users’ passwords in plain text Yesterday, Facebook made the headlines once again for alleged violations of the privacy of its users, the company admitted to have ‘unintentionally’ collected

I’ve been needling the artificial intelligence (AI) hype bubble since 2015 when, after managing a CalTech research grant, I saw a massive discrepancy between the attitudes of buzzword merchants and data scientists. Later, in 2017, I was the lone dissenting

Lab Dookhtegan hackers leaked details about operations carried out by Iran-linked OilRig group, including source code of 6 tools. A hacker group that goes online with the name Lab Dookhtegan have disclosed details about operations conducted by the Iran-linked cyber-espionage

New ransomware spotted NamPoHyu Virus or MegaLocker virus targeting the remote samba servers in a unique way. The common way of delivering ransomware is through email attachments or by compromising the victim’s network and ransomware infection are installed on the

A security researcher identified eight unsecured databases that held “approximately 60 million records of LinkedIn user information.” GDI Foundation, where the security researcher is from, is a nonprofit organization with a mission to “defend the free and open Internet by

Attackers exploit the vulnerability of the Yuzo Related Posts plugin.Email automation service Mailgun has added a long list of companies that were victims of large-scale coordinated attacks on websites run by WordPress on Wednesday, April 10. In the course of

A financially motivated gang is targeting retailers and financial institutions around the world using remote access software. CyberInt’s Research Lab has found that TA505 is using tactics and an off-the-shelf commercial remote administration tool, developed by Russian-based company TektonIT. The

Facebook revealed that it has harvested and uploaded 1.5 million users email contacts who sign up for the social network since 2016. The email address was scrapped when Facebook asks users to enter their passwords who signed up for new

Security experts are warning of a new state-sponsored DNS hijacking campaign affecting at least 40 organizations across 13 countries. Cisco Talos revealed in a blog post yesterday that the “Sea Turtle” campaign began back in January 2017 and has been

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by a dedicated attacker. There is a lot of validity to this approach. Most companies and

Global spending on cloud security is set to grow nearly 18% to reach $12.7bn by 2023, with protection for public cloud deployments prioritized over the coming years, according to a new report from Forrester. Organizations spent $178bn on public cloud

The developers of the Symfony PHP web application framework released updates that patch five vulnerabilities, three affecting the Drupal CMS. The development team of the Symfony PHP web application framework released security updates for five issues, three of which also

So, you want to break cryptography. Brute force attacks on cryptography could take billions of years, which no one has to spare. Maybe you live in a country where rubber hose cryptography is, shall we say, frowned upon. Hacking a