<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3385998300716176663</id><updated>2026-01-24T16:07:23.403+05:30</updated><category term="Hacking News"/><category term="News"/><category term="Tutorials"/><category term="Hacking Tutorials"/><category term="Vulnerability"/><category term="Hacking"/><category term="Malwares"/><category term="Linux Tutorials"/><category term="Data Leak"/><category term="Linux"/><category term="OS"/><category term="Android"/><category term="Russian Hackers"/><category term="Cyber Crime"/><category term="Hacking Tools"/><category term="SEO"/><category term="Cryptocurrency"/><category term="Cyber Attack"/><category term="DDoS"/><category term="SQL Injection"/><category term="Server"/><category term="Backtrack"/><category term="Joomla"/><category term="Trojan"/><category term="databreach"/><category term="Centos"/><category term="Exploit"/><category term="Google"/><category term="Mobile"/><category term="Monero"/><category term="Remote Code Execution"/><category term="Technology"/><category term="Ubuntu"/><category term="VoIP"/><category term="Web Development"/><category term="XSS"/><category term="rat"/><category term="Adsense"/><category term="Asterisk"/><category term="Blogging"/><category term="Botnet"/><category term="Chinese Hackers"/><category term="Cipher"/><category term="Credit Card"/><category term="LFI"/><category term="MySQL"/><category term="SIP"/><category term="Source Code"/><category term="Tricks"/><category term="Wi-Fi"/><category term="Windows Server"/><category term="facebook"/><category term="AWS"/><category term="Ads"/><category term="Anonymous"/><category term="Apache"/><category term="Avengers Endgame"/><category term="Bitcoin"/><category term="Blackhat"/><category term="Cheet Sheet"/><category term="Cisco"/><category term="Cloud Storage"/><category term="Cryptomining"/><category term="DOS"/><category term="Darknet"/><category term="Defacement"/><category term="Email"/><category term="Gadgets"/><category term="GitHub"/><category term="GitLab"/><category term="HAProxy"/><category term="Information Disclosure"/><category term="Kernel"/><category term="Load Balancing"/><category term="MITM"/><category term="Marvel"/><category term="Memcache"/><category term="Microsoft"/><category term="Networking"/><category term="OWASP"/><category term="PHP"/><category term="Phishing"/><category term="Ransomware"/><category term="Root"/><category term="Rooting"/><category term="Russian Military"/><category term="Social Engineering"/><category term="Tor"/><category term="US Elections"/><category term="VPN"/><category term="Windows XP"/><category term="Wordpress"/><category term="Yahoo"/><category term="Zero-Day"/><category term="aggregateiq"/><category term="cambridge analytica"/><category term="e-Commerce"/><category term="iOS"/><category term="intel"/><category term="meltdown"/><category term="spectre"/><category term="APT"/><category term="ARP Spoof"/><category term="Addons"/><category term="Adobe"/><category term="Aircrack"/><category term="Alexa"/><category term="AndroRAT"/><category term="Apple App Store"/><category term="Backup"/><category term="Blogspot"/><category term="Bruteforce"/><category term="BuckHacker"/><category term="Bug"/><category term="COVID-19"/><category term="CSRF"/><category term="CVE-2014-0160"/><category term="CVE-2017-5715"/><category term="CVE-2017-9805"/><category term="CVE-2018-6460"/><category term="CVE-2018-6789"/><category term="Calender2"/><category term="Carding"/><category term="Cheat Sheet"/><category term="Chinese Spies"/><category term="City Union Bank"/><category term="CodeIgniter"/><category term="Coronavirus"/><category term="Cryptcat"/><category term="Cryptocurrency Malware"/><category term="Cryptojacking"/><category term="CyberSecurity"/><category term="DAVOSET"/><category term="DNN"/><category term="Dark Web"/><category term="Dating"/><category term="DealersChoice"/><category term="Debian"/><category term="DevOps"/><category term="DigitalOcean"/><category term="Distro"/><category term="Dot Net"/><category term="Download Lightweight Portable Security"/><category term="Drupal"/><category term="EC-Council"/><category term="Encryption"/><category term="Europe"/><category term="European Cyber Army"/><category term="Exim"/><category term="FBI"/><category term="FTP"/><category term="FUD"/><category term="Fake Tools"/><category term="Firefox"/><category term="Full Movie"/><category term="GPS"/><category term="Google Chrome"/><category term="GootKit"/><category term="HP"/><category term="Heartbleed Bug"/><category term="Hosting"/><category term="IBM"/><category term="IIS"/><category term="IPCop"/><category term="Identity Theft"/><category term="Indian Hackers"/><category term="Intrusion Detection"/><category term="JasperLoader"/><category term="Jenkins"/><category term="Kali Linux"/><category term="Keylogger"/><category term="Korean Hackers"/><category term="Kubernetes"/><category term="Lightweight Portable Security (LPS)1.5.0"/><category term="LiteCommerce"/><category term="Malspam"/><category term="Memfixed"/><category term="Metasploit"/><category term="Miner"/><category term="Mirai"/><category term="MongoDB"/><category term="Movie"/><category term="Mozilla"/><category term="MyFitnessPal"/><category term="NETRA"/><category term="Netcat"/><category term="Netgear Routers"/><category term="Olympics"/><category term="Open Source"/><category term="Open VAS"/><category term="PNB"/><category term="Pakistani Hackers"/><category term="Password"/><category term="Password Cracking"/><category term="Password Expiry"/><category term="Patch"/><category term="PayPal"/><category term="Privacy"/><category term="Privilege Escalation"/><category term="Programming"/><category term="Proxy"/><category term="Qrypter"/><category term="RSA Conference 2014"/><category term="Rainbow Tables"/><category term="Reaper"/><category term="ReconnectAssange"/><category term="Red Hat"/><category term="Redis"/><category term="RedisWannaMine"/><category term="Risks"/><category term="RoyalCLI"/><category term="RoyalDNS"/><category term="Rucyborg"/><category term="S3"/><category term="SMS Spoofing"/><category term="SSH"/><category term="SSL Strip"/><category term="SWIFT"/><category term="SamSam"/><category term="Saposhi"/><category term="Scam"/><category term="Scripts"/><category term="SecretCrush"/><category term="Security"/><category term="Snake"/><category term="Snort"/><category term="Spam"/><category term="Stuxnet"/><category term="Tabnapping"/><category term="Telegram"/><category term="Telnet"/><category term="Tesla"/><category term="Thanos"/><category term="Tinder"/><category term="Tor Browser"/><category term="Tor Instant Messager"/><category term="Torrent"/><category term="Triada"/><category term="US-CERT"/><category term="USA"/><category term="Ukraine"/><category term="WEP"/><category term="Wearable Technology"/><category term="Web Security"/><category term="Western Union"/><category term="WhatsApp"/><category term="WiFi Finder"/><category term="Wikipedia"/><category term="Winter Olympics"/><category term="Xenocode"/><category term="adwind"/><category term="apple"/><category term="bodybuilding.com"/><category term="branchscope"/><category term="cPanel"/><category term="crouching yeti"/><category term="cryprocurrency mining"/><category term="database"/><category term="donald trump"/><category term="dragonfly"/><category term="energetic bear"/><category term="evm hacking"/><category term="evm tempering"/><category term="expedia"/><category term="fancy bear"/><category term="graykey"/><category term="honor"/><category term="htaccess"/><category term="huawei"/><category term="ionCube"/><category term="iphone"/><category term="iphone unlocking"/><category term="isro"/><category term="jailbreak"/><category term="julian assange"/><category term="mac software"/><category term="macOS"/><category term="notPetya"/><category term="ophthalmoscope"/><category term="orbitz"/><category term="os-commerce"/><category term="phpMyAdmin"/><category term="politics"/><category term="qarallax"/><category term="quaverse"/><category term="rottensys"/><category term="security spending"/><category term="sitelock"/><category term="sofacy apt"/><category term="under armour"/><category term="voting machine"/><category term="wikileaks"/><category term="xiomi"/><category term="xtremerat"/><title type='text'>Hackers Chronicle - Online Cyber Security News</title><subtitle type='html'>Latest Cyber Security News, Hacking Tutorials, Linux Tutorials, News</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>cyb3r.gladiat0r</name><uri>http://www.blogger.com/profile/05122125366641803109</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPBckLshPbrFoTu0RgOmXJQMgLBUsLLrD_k_udJtX9NXrYNIpgF8CrFtU4vVc52mCxQiaQ3fsnkORfTJXCIQRqiTWUrIwQzFmKZgk5TN15iBzxDx1MEMgxZrOH_SWWRts/s1600/*'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>160</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-8000171769812628293</id><published>2020-04-22T13:05:00.000+05:30</published><updated>2020-04-22T13:05:41.789+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Coronavirus"/><category scheme="http://www.blogger.com/atom/ns#" term="COVID-19"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>How did Coronavirus starts and what animals came into Coronavirus</title><summary type="text">


How did Coronavirus starts and what animals came into Coronavirus



To find out how the deadly corona virus reached humans from animals efforts are going on.In a region of China, a bats, while hovering in the sky, released the residue of the coronavirus through its droppings which fell on the ground in the forest. A wild animal, possibly a pangolin, smelled it and through it it spread to the </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/8000171769812628293/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2020/04/how-did-coronavirus-starts-and-what-animals-came.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/8000171769812628293'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/8000171769812628293'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2020/04/how-did-coronavirus-starts-and-what-animals-came.html' title='How did Coronavirus starts and what animals came into Coronavirus'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjspGg4qBIqGvDcXgHUvNLHGdLmoeasBGrw2l8cf4ZpKbkqOcjPp9oKNHa0goNhQJ0BQL6cBvSV8YOZ0O1KbiPgf3U4ha60WreRXAXMSsuEhO1dQ_baft9hoX3BFN_zvyG3X78TwIiSirH1/s72-c/How+did+Coronavirus+starts+and+what+animals+came+into+Coronavirus.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-5303925404394821511</id><published>2019-05-01T11:05:00.003+05:30</published><updated>2019-05-01T11:05:43.304+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Dating"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="SecretCrush"/><title type='text'>Facebook is Going To Start Dating Service: Secret Crush</title><summary type="text">



Facebook announced at its F8 conference today a new feature to its Dating repertoire, this one apparently designed to help single minglers poach potential paramours from their Friends by adding them to an ostensibly private list of people you’re crushing on.

Here’s how this is supposed to go down: You add up to nine people to a “Secret Crush” list. After you do, those nine people will </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/5303925404394821511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/05/facebook-secretcrush-dating-service.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5303925404394821511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5303925404394821511'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/05/facebook-secretcrush-dating-service.html' title='Facebook is Going To Start Dating Service: Secret Crush'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxieeq-PUmCvnI2BZnrheLsbFW6_5laXOlKSNWLB6VyfwP612CHdTGr1Ib8pi3A7O3XnTIA8WX9dTlTKRDube2O8XKtS8Jf17tITZxf6-fq9mR2bhC7fwemLdA26RDNturzrGtqxuMdBj7/s72-c/Facebook-Secret-Crush.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-993700916234156556</id><published>2019-04-30T10:10:00.000+05:30</published><updated>2019-04-30T10:10:23.642+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="Cryptocurrency"/><category scheme="http://www.blogger.com/atom/ns#" term="databreach"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Microsoft Outlook Breach Targeting Cryptocurrency Users</title><summary type="text">



Earlier this month, news broke out that hackers were not only able to access Outlook users’ email metadata as previously reported, but also email content. The breach centered around a hacker getting hold of a Microsoft customer support worker’s login credentials; from there, the hacker could dive into the content of any non-corporate Outlook, Hotmail, or MSN account, Motherboard found.Now, </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/993700916234156556/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/microsoft-outlook-breach-bitcoin.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/993700916234156556'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/993700916234156556'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/microsoft-outlook-breach-bitcoin.html' title='Microsoft Outlook Breach Targeting Cryptocurrency Users'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHkvDoGBQpjT4W3SvbIPYYq3OcyhA4R4zK1748reunJHUTabTQPZrNb3Q1AnY8mD5qAX4HIbDwkHuqtXWX1cgbPJlfoVL7Tym4y3HotYKXBllGvEWyQTZRx4w1ztbekvKG5Wkl_vikSIe5/s72-c/bitcoin_outlook_breach.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-1791369942302225968</id><published>2019-04-29T11:12:00.000+05:30</published><updated>2019-04-29T11:12:26.446+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Europe"/><category scheme="http://www.blogger.com/atom/ns#" term="GootKit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="JasperLoader"/><category scheme="http://www.blogger.com/atom/ns#" term="Malspam"/><category scheme="http://www.blogger.com/atom/ns#" term="Malwares"/><category scheme="http://www.blogger.com/atom/ns#" term="Spam"/><title type='text'>Multi-Stage Malware Loader Hits Europeans via Signed Malspam</title><summary type="text">


Multiple malicious spam campaigns using signed emails have been observed while distributing the GootKit (aka talalpek or Xswkit) banking Trojan with the help of a multi-stage malware loader dubbed JasperLoader over the past few months.

This loader is the third one detected by Cisco Talos&#39; research team since July 2018, with Smoke Loader (aka Dofoil) being employed by threat actors to drop </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/1791369942302225968/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/multistage-malware-loader-jasperloader.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1791369942302225968'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1791369942302225968'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/multistage-malware-loader-jasperloader.html' title='Multi-Stage Malware Loader Hits Europeans via Signed Malspam'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmrjDKffNtOT802AuAJrLLSSXnZH_IrCmH7XuGuZ0b_7-y-K2e_sXeb79AqIntkQGOkpST-kcH6oB_fg1Q_Mj8FrWJdeFg1kzjQCWU6SbQ2uhVCpqCxxEMKo6T7CrTVbQz77f81UHJ1upH/s72-c/Malspam.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-1205682535413031585</id><published>2019-04-27T10:32:00.000+05:30</published><updated>2019-04-27T10:32:14.270+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Avengers Endgame"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Marvel"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><category scheme="http://www.blogger.com/atom/ns#" term="Thanos"/><title type='text'>Stop What You’re Doing and Google ‘Thanos’</title><summary type="text">



Avengers: Endgame is smashing box office records, collecting more than $60 million yesterday alone.

And while the internet is going over Endgame, we’re just over here trying to finish out the work week so we can slide into a theater for a peek at the film. We are the kind of people who believes in first day first say but sadly we don not get any ticket as early as Sunday night. Needless to </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/1205682535413031585/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/google-easteregg-thanos.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1205682535413031585'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1205682535413031585'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/google-easteregg-thanos.html' title='Stop What You’re Doing and Google ‘Thanos’'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3E0nDEJTu9tAg2jpEUWpKIe4oP_fLv-AbRkRr1Fo_8_KqM6MqeCPmxhqiyjgeownfgF4uh-qxMXRghyibKT13SeTWbsopr5ssjOFAEWpLAMtr2MpIG-NhTrbhpkXnO65bTCxCqJajVRa9/s72-c/avengers-endgame.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-7257018961230971174</id><published>2019-04-26T11:36:00.000+05:30</published><updated>2019-04-26T11:43:14.424+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Avengers Endgame"/><category scheme="http://www.blogger.com/atom/ns#" term="Chinese Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Full Movie"/><category scheme="http://www.blogger.com/atom/ns#" term="Marvel"/><category scheme="http://www.blogger.com/atom/ns#" term="Movie"/><category scheme="http://www.blogger.com/atom/ns#" term="Russian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Torrent"/><title type='text'>Avengers: Endgame Leaked Online in China</title><summary type="text">






Marvel’s latest and perhaps the most anticipated movie ever to be released Avengers: End Game has become an object of controversy lately as hackers and cybercriminals are trying their best to benefit from the movie’s widespread, intense hype.

Last week, Marvel fans were requested to not use social media after a video made via mobile phone containing movie spoilers was posted online. Now </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/7257018961230971174/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/avengers-endgame-leaked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/7257018961230971174'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/7257018961230971174'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/avengers-endgame-leaked.html' title='Avengers: Endgame Leaked Online in China'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDolKTrpqGHDs64QYKSgieSRuSKbRzKuqomzLQmi0DK6pbUP_SiLGPfSSy-FqLCnF4fS8_yLwrsL0HcOjQAGc1R3G6dV1kstZKK2KfaXYYOSlwNjpZXvo_xKei_oNtfT46lxKCPMHhs6Kh/s72-c/avengers-endgame-full-movie-download.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-619744072502674384</id><published>2019-04-25T10:24:00.000+05:30</published><updated>2019-04-25T10:42:28.585+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Password"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Expiry"/><category scheme="http://www.blogger.com/atom/ns#" term="Technology"/><title type='text'>Password Expiry rules are useless: Microsoft</title><summary type="text">




&amp;nbsp;Ever had to change your password for no reason? Before, it was annoying. Now, it&#39;s useless.

Microsoft has admitted that one of the great curses of our time, the password reset rule, is nonsense.

&quot;When humans are assigned or forced to create passwords that are hard to remember, too often they&#39;ll write them down where others can see them,&quot; Microsoft&#39;s Aaron Margosis wrote in a blog </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/619744072502674384/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/password-expiry-rules-are-useless.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/619744072502674384'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/619744072502674384'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/password-expiry-rules-are-useless.html' title='Password Expiry rules are useless: Microsoft'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqUF_WuEse2kZ0JaRkL9KfdsgNTITKFOlBjF3k_mgQ9Sx5gPpxQr007nzlJWs4CJE9aybr4FNChxuvk8JDa-vFbo7xU0ux-sQgS_mTuiDb-hLTKDmcAklCDvRsRY2yy1sJciX5C6j71tJ4/s72-c/microsoft-password-expiry.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-6142019167958551975</id><published>2019-04-24T13:07:00.001+05:30</published><updated>2019-04-24T13:12:43.866+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="bodybuilding.com"/><category scheme="http://www.blogger.com/atom/ns#" term="databreach"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Bodybuilding.com confirms Data Breach</title><summary type="text">



Bodybuilding.com, the internet&#39;s biggest online store and online forum for fitness and bodybuilding enthusiasts, has disclosed last week a security breach that impacted its IT systems.

Customer data might have been exposed, the company said in a short message posted on its website. Its staff isn&#39;t sure if the attacker accessed customer data, though.

A third-party security firm was hired to </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/6142019167958551975/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/bodybuildingcom-confirms-data-breach.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/6142019167958551975'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/6142019167958551975'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/bodybuildingcom-confirms-data-breach.html' title='Bodybuilding.com confirms Data Breach'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjav4fT_vy7AeU-yBoFGrd1P0avUFMV_V3pVWbMrJnnzVZTdh9WNajlxHgh7WH3clxT3ByH0VgxReB0_Cod9GEQWwfNLirHPGCoUEYnFJ0nEtY2-tDMBaa4TzgiV8_i9EjE8FaEjB2RlnSm/s72-c/bodybuilding-hacked.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-2198723924764196255</id><published>2019-04-23T13:18:00.003+05:30</published><updated>2019-04-23T13:18:48.992+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Data Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="DigitalOcean"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="Wi-Fi"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Finder"/><title type='text'>2 Million Wi-Fi Passwords Leaked</title><summary type="text">



Wi-Fi Hotspot Finder Spills 2 Million Passwords Online

A popular hotspot finder app for Android exposed the Wi-Fi network passwords for more than two million networks.The app, downloaded by thousands of users, allowed anyone to search for Wi-Fi networks in their nearby area. The app allows the user to upload Wi-Fi network passwords from their devices to its database for others to use.That </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/2198723924764196255/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/2-million-wi-fi-passwords-leaked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/2198723924764196255'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/2198723924764196255'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/2-million-wi-fi-passwords-leaked.html' title='2 Million Wi-Fi Passwords Leaked'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_JzcJ1AsuRYfsljM1cITPR7YLgu-D-N76enZhfj9tuMOE08vCJnkM1jG-LmooyQWWC4TBPZ4GvvJqj0LTXuC_bEQ33v_D4qofBTBGN9gVbsA5rWJ-FhRiggoxyFtpd47iomLFe0IwzTIt/s72-c/wifi-finder.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-5037455992469939700</id><published>2019-04-15T10:15:00.003+05:30</published><updated>2019-04-15T10:15:45.018+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Data Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>Personal Data of FBI Agents leaked</title><summary type="text">



hackers leak personal data of fbi agent
Three websites belonging to the Federal Bureau of Investigation’s (FBI) National Academy Association (FBINAA) were hacked apparently by three hackers after they managed to breach their security, steal and upload data online.

Part of the uploaded content was dozens of documents containing personal information of federal agents and law enforcement </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/5037455992469939700/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2019/04/personal-data-of-fbi-agents-leaked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5037455992469939700'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5037455992469939700'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2019/04/personal-data-of-fbi-agents-leaked.html' title='Personal Data of FBI Agents leaked'/><author><name>cyb3r.gladiat0r</name><uri>http://www.blogger.com/profile/05122125366641803109</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='31' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPBckLshPbrFoTu0RgOmXJQMgLBUsLLrD_k_udJtX9NXrYNIpgF8CrFtU4vVc52mCxQiaQ3fsnkORfTJXCIQRqiTWUrIwQzFmKZgk5TN15iBzxDx1MEMgxZrOH_SWWRts/s1600/*'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHQpeMQxcICm5IPBC_C1bUWF43XRKGUxb3tFKXY50jQ3HOJl22SLE2a444BP1IU7I8Nqw1Kx3T4yYR9wedV1QGhx_Qv6hKLYOofV0lK7XvhSUARbGaXIJrYyKEYRKrFeR8zTntUkHRu6Q/s72-c/fbi-leak.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-7498578666366891751</id><published>2018-04-06T09:30:00.000+05:30</published><updated>2018-04-06T13:40:06.685+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="evm hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="evm tempering"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="voting machine"/><title type='text'>Voting Machine firewall details and passwords leaked online</title><summary type="text">





A sysadmin at a number one mechanical device vendor denote a firewall configuration file, as well as passwords, into a public Cisco support forum in 2011, gap the corporate up to attainable attack.
The config files expose a wealth of knowledge helpful to Associate in Nursing wrongdoer, as well as the name, hostname, and ASA version range. whereas there&#39;s no proof that the mechanical device </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/7498578666366891751/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/04/evm-password-leaked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/7498578666366891751'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/7498578666366891751'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/04/evm-password-leaked.html' title='Voting Machine firewall details and passwords leaked online'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7B6FUrs1Xkli2dBiG8sucr_mhoaIIoVfv2I0nvFZIBpm74L9LvSHN2FbDe1nUzJ0NUVdI5v2MCvi-6QYPNPryWwmQbAzUkNvLB1F8IUvQ6WDpJ4p6zBLJO4GCYh4Erl14C6orQfKWFvY/s72-c/Electronic-Voting-hacked.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-7217899526066340150</id><published>2018-04-03T10:38:00.000+05:30</published><updated>2018-04-03T13:09:58.629+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="databreach"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="MyFitnessPal"/><category scheme="http://www.blogger.com/atom/ns#" term="under armour"/><title type='text'>Under Armour Fitness App MyFitnessPal data breached affecting 150 million users</title><summary type="text">



&amp;nbsp;

Under Armour, Inc. last week announced that it is notifying users of MyFitnessPal - the company&#39;s food and nutrition application and website - about a massive data breach affecting 150 million users. But according to the comapny sources, Payment card data was not compromised because it is collected and processed separately.&amp;nbsp;

A massive data breach on March 29 that impacted 150 </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/7217899526066340150/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/04/under-armour-data-breach.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/7217899526066340150'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/7217899526066340150'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/04/under-armour-data-breach.html' title='Under Armour Fitness App MyFitnessPal data breached affecting 150 million users'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt3FA8mAmz1C1o0BjaaMWheMFcBxhvgcylN7-KTbsqpGh92hAMUOWeq9gpBEfP5gWl77xbCxGB42KLXYAE6qVFRbvgZ5j6QZjg8dO9uFQnG7dXw_COuSBCVDG7qEb6MLnD_kPsFZY4s5La/s72-c/under-armour-data-leak.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-547962904143354183</id><published>2018-03-29T10:00:00.001+05:30</published><updated>2018-03-29T12:12:54.644+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="julian assange"/><category scheme="http://www.blogger.com/atom/ns#" term="politics"/><category scheme="http://www.blogger.com/atom/ns#" term="ReconnectAssange"/><category scheme="http://www.blogger.com/atom/ns#" term="wikileaks"/><title type='text'>Ecuador disabled Wikileaks founder Julian Assange&#39;s Internet Access</title><summary type="text">





The founder of WikiLeaks has been offline for a few hours after Ecuador suspended his internet access. WikiLeaks’ founder Julian Assange can’t connect to the internet anymore.

On Wednesday, Ecuador’s government posted a statement on Twitter saying it cut Assange’s internet access for sending out messages meddling with other countries’ affairs. The message, posted in Spanish, said Assange </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/547962904143354183/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/ecuador-cuts-off-julian-assanges-internet-access.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/547962904143354183'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/547962904143354183'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/ecuador-cuts-off-julian-assanges-internet-access.html' title='Ecuador disabled Wikileaks founder Julian Assange&#39;s Internet Access'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieb-VZsU0bCIz6FcGRBe_0j_uch_S229GgnzMf5CtFhsHUxcOs2z1Sh7gKyd2Pcp8xI6qUBB5n85E59LwoWbrhExVIwV9e_thuLa4GUUrYNGFX1J_WvxwAq74tK-Et3gco38uEWWCzUS0M/s72-c/julian-assange.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-1684588031434433950</id><published>2018-03-28T10:00:00.001+05:30</published><updated>2018-03-28T13:19:00.335+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="branchscope"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="intel"/><category scheme="http://www.blogger.com/atom/ns#" term="meltdown"/><category scheme="http://www.blogger.com/atom/ns#" term="spectre"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>Intel CPUs Vulnerable To New Spectre-Like Attack, BranchScope</title><summary type="text">




Security researchers have discovered a new wave of attacks called BranchScope. Yet we&#39;re not done with the Meltdown and Spectre security flaws that put billions of devices at risk of attacks.

BranchScope :  It&#39;s a new side-channel attack discovered by four security researchers from College of William and Mary, Carnegie Mellon University in Qatar, University of California Riverside, and </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/1684588031434433950/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/intel-branchscope-vulnerability.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1684588031434433950'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1684588031434433950'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/intel-branchscope-vulnerability.html' title='Intel CPUs Vulnerable To New Spectre-Like Attack, BranchScope'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-OgISz-LWmIqbGtXLg6c-5TcL-lE1G9t1shQoILWCUnuGovEIVJZ45gZA2mz_a1ia22TODVdCE7G0V37HVPFnR5H0Zk5jNmRKLoMnka2655VsKMsOK0C_YErOBXlhyphenhyphenjZG3zl3EJF4A-nK/s72-c/BranchScope.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-1080701589817145233</id><published>2018-03-27T11:04:00.000+05:30</published><updated>2018-03-27T14:34:22.844+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="aggregateiq"/><category scheme="http://www.blogger.com/atom/ns#" term="cambridge analytica"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="GitLab"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="Source Code"/><category scheme="http://www.blogger.com/atom/ns#" term="US Elections"/><title type='text'>Source Code of Tools used by Cambridge Analytica to hijack Facebook accounts leaked</title><summary type="text">



AggregateIQ – a Canadian political advertising firm that played a role in the 2016 US election and the UK&#39;s &quot;Vote Leave&quot; Brexit campaign – left its applications and database credentials publicly accessible, security firm Upguard said on Monday.

There&#39;s no evidence that the exposed code or data was taken. Nor is there evidence it wasn&#39;t. It was simply left accessible to the public for an </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/1080701589817145233/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/source-code-of-tools-used-by-cambridge.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1080701589817145233'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1080701589817145233'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/source-code-of-tools-used-by-cambridge.html' title='Source Code of Tools used by Cambridge Analytica to hijack Facebook accounts leaked'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEduR2TtnILaL7oVBznbPnhekcKb7ZUMzGSSXO-DjClOz4H8ZOa0bA67PKwukye5wjLX20yb_-8wnVZUWw54q9q-qodV4ADTCvDelRzYheXpz1mmbGYVSh5jKd3sff7a1eoufQYu76eayC/s72-c/facebook-data-leak.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-1209290222772483063</id><published>2018-03-23T10:00:00.000+05:30</published><updated>2018-03-23T14:05:30.320+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="database"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="MongoDB"/><title type='text'>MongoDB Hacked in 13 seconds demanding for ransom</title><summary type="text">



The hackers have been exploiting unprotected MongoDB for the last couple of years, based servers to steal data and hold the exposed databases for ransom. In order to raise awareness, hackers leaked 36 million records of internal data collected from several vulnerable servers.


The IT security researchers from German firm Kromtech conducted an experiment in which they purposely left a MongoDB</summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/1209290222772483063/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/mongodb-hacked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1209290222772483063'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/1209290222772483063'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/mongodb-hacked.html' title='MongoDB Hacked in 13 seconds demanding for ransom'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM3RrQ7ct6l67yOe5gYYcqqtZ7uqmOTa-2Gn3IK-6GnuP_5drlgq214myKQEqRc6-8cTvHbkmgct3gYNOCVwcUCNuNMWwt5zBQW6rxdlu9gvyhTePv1M82P6H4skau8qTcb_HPu6m9pJI/s72-c/mongodb-hacked.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-2137603708155170462</id><published>2018-03-22T10:00:00.000+05:30</published><updated>2019-03-09T18:15:05.370+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDoS"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="Malwares"/><category scheme="http://www.blogger.com/atom/ns#" term="sitelock"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>18.5 Million Websites Infected With Malware</title><summary type="text">On the internet, there are more than 1.86 billion websites. Around 1% of these -- something like 18,500,000 -- are infected with malware at a given time each week; while the average website is attacked 44 times every day.

Sitelock has published its Q4 2017 Website Security Insider analysis of malware and websites based on statistics from 6 million of its 12 million customers. All these customers</summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/2137603708155170462/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/website-malware-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/2137603708155170462'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/2137603708155170462'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/website-malware-attack.html' title='18.5 Million Websites Infected With Malware'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX7tz1gHmgqsrr-J_aVIopZgZubXEunrBTNrAq0HQtwzYyAXdSGnrxqAKJ8MdV_UnVTh0u8FWcayQlOibNEOIrGlRrWEzi-F5NSjTd1q6BdRC4z45xNLyFKVRYsZsOWKLNynTKk5o8XcE/s72-c/website-malware-attack.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-6362369066229471105</id><published>2018-03-21T10:00:00.000+05:30</published><updated>2018-03-21T11:31:31.100+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Credit Card"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="databreach"/><category scheme="http://www.blogger.com/atom/ns#" term="expedia"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="orbitz"/><title type='text'>Data Breach at Orbitz exposed 880,000 credit cards</title><summary type="text">



Travel website Orbitz, a subsidiary of Expedia Inc. disclosed Tuesday a security breach that may have exposed data for thousands of customers, including information on 8,80,000 credit cards.

The Expedia-owned travel website operator said the breach affected an older website and the platform of an unnamed business partner. The information attackers “likely accessed” included people’s names, </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/6362369066229471105/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/orbitz-data-breach.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/6362369066229471105'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/6362369066229471105'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/orbitz-data-breach.html' title='Data Breach at Orbitz exposed 880,000 credit cards'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXXnPBMyuwTZoTNpyjN5CmLaO3JgDrV_xEgkSgKkPR0P4xYcnurZoX4pSXj-nu-cIXOoSwGopMJ_93H6fTS6HMEVLoE8LLvYMQZKa_IRliLx5uzrFD3dXuM1FW5x7oI8SLiHgrFdSJIL77/s72-c/expedia-hacked.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-6456910009048620040</id><published>2018-03-20T09:30:00.000+05:30</published><updated>2018-03-20T12:59:23.593+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="CVE-2017-5715"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="intel"/><category scheme="http://www.blogger.com/atom/ns#" term="Malwares"/><category scheme="http://www.blogger.com/atom/ns#" term="meltdown"/><category scheme="http://www.blogger.com/atom/ns#" term="spectre"/><title type='text'>Intel processors will use hardware-based protections against Meltdown and Spectre 2</title><summary type="text">



Intel has officially pushed out microcode updates with Spectre and Meltdown mitigations for all of the processors it launched in the past five years.

In addition to this, the company’s CEO announced new, redesigned processor lines that will start shipping later this year and will include hardware-based protection for Meltdown (exploiting CVE-2017-5754, a rogue cata cache load flaw) and </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/6456910009048620040/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/intel-meltdown-spectre-patch.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/6456910009048620040'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/6456910009048620040'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/intel-meltdown-spectre-patch.html' title='Intel processors will use hardware-based protections against Meltdown and Spectre 2'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9EtGh1NAW69qca9ByY_y1QdHET3Iwt7bxUc37EhPSlTaJJFQNiy49abJzlV0iIx62d7Ni21AFBKVob3eeDXqBb5jdZeAvaLOseuAkgrXcRP0n-2GjKGTMrF-lz5cEyFGKR21uYXhsOnee/s72-c/intel-meltdown-spectre-patch.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-2719614832055079386</id><published>2018-03-19T10:30:00.000+05:30</published><updated>2018-03-19T12:25:47.323+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="crouching yeti"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="DealersChoice"/><category scheme="http://www.blogger.com/atom/ns#" term="dragonfly"/><category scheme="http://www.blogger.com/atom/ns#" term="energetic bear"/><category scheme="http://www.blogger.com/atom/ns#" term="fancy bear"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="Russian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="sofacy apt"/><category scheme="http://www.blogger.com/atom/ns#" term="US-CERT"/><title type='text'>Russia Linked hacking group Sofacy APT attacking European Government Agencies</title><summary type="text">



Last week the US Government announced sanctions against five Russian entities and 19 individuals, including the FSB, the military intelligence agency GRU.

Despite the sanctions, Russian hackers continue to target entities worldwide, including US organizations.

The Russian spy agencies and the individuals are accused of trying to influence the 2016 presidential election and launching massive</summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/2719614832055079386/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/european-government-under-russian-cyber-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/2719614832055079386'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/2719614832055079386'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/european-government-under-russian-cyber-attack.html' title='Russia Linked hacking group Sofacy APT attacking European Government Agencies'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWjy6QuFllWbAluEJnhxN3IM-J47fd6jyqAfwLumiaHtJotl50ubw46Ag1dConjKBJa8CAyD7wfi_F6VGn10Yop72k-4MHqSxXg-NtfZZQ_loZbxSZz0PVc2qkputRhlEH6xS4D2klWKmV/s72-c/fancy-bear-attck.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-3904603568097575219</id><published>2018-03-18T08:00:00.000+05:30</published><updated>2018-03-27T14:27:37.939+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="aggregateiq"/><category scheme="http://www.blogger.com/atom/ns#" term="cambridge analytica"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Leak"/><category scheme="http://www.blogger.com/atom/ns#" term="databreach"/><category scheme="http://www.blogger.com/atom/ns#" term="donald trump"/><category scheme="http://www.blogger.com/atom/ns#" term="facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="US Elections"/><title type='text'>50 Million Facebook Accounts Hijacked to help Trump Win</title><summary type="text">



50 million Facebook accounts, most of them in the United States, had their data harvested in 2014 by a company looking for ways to target people with political messages. Facebook has denied this was a data breach.

A whistleblower named Christopher Wylie, who used to work at a company called Cambridge Analytica, gave a dossier of evidence including “emails, invoices, contracts and bank </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/3904603568097575219/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/facebook-data-breach.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/3904603568097575219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/3904603568097575219'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/facebook-data-breach.html' title='50 Million Facebook Accounts Hijacked to help Trump Win'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUEmmat2-sv6abghJmD2zJxbrD88SmG_6cMo92OLAiycOXq81J34cWQIQ97G_3N7YUZTas813lA1CTHxmkXCBDf5SFJZObFBjEM8XcLli-fa9DBXAZBv6hdntT0zjLWuXcIcVzGomOA5No/s72-c/facebook-role-in-us-elections.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-4007433216897112342</id><published>2018-03-17T13:53:00.003+05:30</published><updated>2018-03-17T13:55:45.924+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="graykey"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS"/><category scheme="http://www.blogger.com/atom/ns#" term="iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="iphone unlocking"/><category scheme="http://www.blogger.com/atom/ns#" term="jailbreak"/><title type='text'>Details about tool used by FBI to unlock any Iphone disclosed</title><summary type="text">



A series of hot debates about the backdoor access should be provided or not to law enforcement agencies to Apple devices started after the case of San Bernadino&#39;s locked iPhone. But anyhow agency found a way to unlock the iPhone by taking the help from an Israeli company named Cellebrite, which provides iPhone unlocking services to law enforcement agencies.

But recently name of new a device </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/4007433216897112342/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/iphone-unlocking-tool.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/4007433216897112342'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/4007433216897112342'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/iphone-unlocking-tool.html' title='Details about tool used by FBI to unlock any Iphone disclosed'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie9nNpjo21KXHc6fFJdGFOPCYExqI8z04EGLNY9nH8X3a9u6oLWu8L4tbJOhSh5EArzHWNcrZNK7lbnISY8iq893LiIucqNY1VA8lDCw8pi9E9uvnwmIEcirP4B-SWEyC9siHtxHQGd_ki/s72-c/unlock-iphone.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-5563136576391066296</id><published>2018-03-16T13:20:00.000+05:30</published><updated>2018-03-16T13:20:27.784+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Botnet"/><category scheme="http://www.blogger.com/atom/ns#" term="Chinese Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="honor"/><category scheme="http://www.blogger.com/atom/ns#" term="huawei"/><category scheme="http://www.blogger.com/atom/ns#" term="Malwares"/><category scheme="http://www.blogger.com/atom/ns#" term="rottensys"/><category scheme="http://www.blogger.com/atom/ns#" term="xiomi"/><title type='text'>5 Million Popular Android Phones found with pre-installed malwares</title><summary type="text">



Security researchers at CheckPoint have discovered that Chinese Cyber Criminals are using a malware named as RottenSys to attack android phones all over the world; almost 5 million android devices in their botnet network.


&quot;The Check Point Mobile Security Team has discovered a new widespread malware family targeting nearly 5 million users for fraudulent ad-revenues. They have named it ‘</summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/5563136576391066296/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/android-botnet-malware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5563136576391066296'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5563136576391066296'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/android-botnet-malware.html' title='5 Million Popular Android Phones found with pre-installed malwares'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZTEE4Eu0Mm9uTy7XH2DIQs9OMuUpOneSwROHzMWaEAGRIQyz4cPiGfLnxYIBUUTRU4_h37MkHB8YdM0X6eIXS6AyFdq7hlUqzphIauQLEFd_jTmyLPnzfjmAti3ZuBbXAqyktg5xU5IQL/s72-c/android-botnet-malware.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-3895485277709863364</id><published>2018-03-15T13:18:00.002+05:30</published><updated>2018-03-15T13:18:50.295+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="adwind"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="qarallax"/><category scheme="http://www.blogger.com/atom/ns#" term="Qrypter"/><category scheme="http://www.blogger.com/atom/ns#" term="quaverse"/><category scheme="http://www.blogger.com/atom/ns#" term="rat"/><category scheme="http://www.blogger.com/atom/ns#" term="Trojan"/><title type='text'>Hundreds of Organizations Worldwide Attacked by Qrypter Trojan</title><summary type="text">



According to a security firm Forcepoint, Hundreds of organizations all around the globe have been targeted in a series of attacks that leverage the Qrypter remote access Trojan (RAT).

The malware, often mistaken for the Adwind cross-platform backdoor, has been around for a couple of years, and was developed by an underground group called ‘QUA R&amp;amp;D’, which offers a Malware-as-a-Service (</summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/3895485277709863364/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/qrypter-trojan-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/3895485277709863364'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/3895485277709863364'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/qrypter-trojan-attack.html' title='Hundreds of Organizations Worldwide Attacked by Qrypter Trojan'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAgVwEV_ZXbV1VRyhY4xYBu5TbeU1Cy8WuHTunkq65TGlmhGtJN71K0rSgE6uF6ivtc70Emv4KkurY_giuwD7iWvI13_F56FC1Yx-w8g6HuDoOtlAfdGU1oAMDm-Tmds5Ebv3sFLepRyzX/s72-c/qrypter-rat.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3385998300716176663.post-5302579935323665359</id><published>2018-03-14T12:22:00.001+05:30</published><updated>2018-03-14T12:22:43.918+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="isro"/><category scheme="http://www.blogger.com/atom/ns#" term="Malwares"/><category scheme="http://www.blogger.com/atom/ns#" term="rat"/><category scheme="http://www.blogger.com/atom/ns#" term="Trojan"/><category scheme="http://www.blogger.com/atom/ns#" term="xtremerat"/><title type='text'>ISRO computers infected with Malwares, Could be Hacked</title><summary type="text">



Security researchers have claimed that a malware has infected computer systems of  India’s premier space research agency, Indian Space and Research Organization (ISRO).

Indian and French security experts believe that using the vulnerability, hackers could have easily taken control of ISRO’s command rocket launches.

On December 2017, the researchers detected a trojan malware, known as </summary><link rel='replies' type='application/atom+xml' href='http://www.hackerschronicle.com/feeds/5302579935323665359/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.hackerschronicle.com/2018/03/isro-malware-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5302579935323665359'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3385998300716176663/posts/default/5302579935323665359'/><link rel='alternate' type='text/html' href='http://www.hackerschronicle.com/2018/03/isro-malware-attack.html' title='ISRO computers infected with Malwares, Could be Hacked'/><author><name>The Hackers Chronicle</name><uri>http://www.blogger.com/profile/15037732104847840333</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtAoCP4N_b7bZzZsDPujcRd4jTlXUpqHy2oQBMrNtsCQ68UOoIJwYgYhb-Mf3QFHpBMeM12af-3wFRZrJNX_TVnHPr9xC9UpPyIjz6fcK9Nt4KB7csDCkPXfhbwwt1AFVohsoWD4oK9MQx/s72-c/ISRO-infected-with-trojan.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>