SlideShare una empresa de Scribd logo
1 de 13
NEWS BYTES
SEPT-OCT16
CYBER-SEC ENTHUSIAST
BY-Saurabh
Chaudhary
MAJOR HACKS OF THE
MONTH• US SECRET DEFENCE NETWORK HACKED RESULTED IN THE DEATH OF 100
INOCENTS..!!
• YOUR IOT DEVICE MAY HAVE CONTRIBUTED IN THE BIGGEST DDos
ATTACK ..!!!!!
• EARN 50,000$ !!! YOU HEARD IT RIGHT …
• NTRIBUTED IN THE BIGGEST DDos ATTACK ..!!!!!
• DO NOT OPEN JPEG2000….!!
• 32,4000 FINANCIAL RECORD WITH CVV STOLEN ..
• WORLD'S MOST FAMOUS BITCOIN WALLET WAS BREACHED
• PLAINTEXT PASSWORDS AND COMPLETE WEB-SOURCE CODE ON
SALEEEE…
US AIRFORCE
HACKED 62 SYRIAN SOLDIERS, 15 CIVILIANS IN
AFGHANISTAN AND 22 SOMALI SOLDIERS
WERE REPORTEDLY KILLED BY US DRONE
STRIKES
ON 9 SEPTEMBER 2016, THE SIPRNET SYSTEM
CURRENTLY IN OPERATION AT CREECH AFB
FAILED,
 THE AIR FORCE IS INVESTIGATING THE
CONNECTION BETWEEN THE FAILURE OF ITS
CLASSIFIED NETWORK, DUBBED SIPRNET, AT
CREECH AIR FORCE BASE
 SIPRNET, OR SECRET INTERNET PROTOCOL
ROUTER NETWORK, IS A GLOBAL UNITED
STATES MILITARY INTERNET SYSTEM USED FOR
TRANSMITTING CLASSIFIED INFORMATION,
WORLDS LARGEST 1 TBPS DDOS
ATTACK
VICTIM-FRANCE-BASED HOSTING PROVIDER OVH
POWERED BY 1500,000 HACKED IOT DEVICE.
 ANNA-SENPAI HAS RELEASED THE SOURCE CODE FOR IOT BOTNET NAMED
MARAI…. I AM STILL WONDERING WHY THE MALWARE'S AUTHOR CHOSE TO DUMP
THE CODE ONLINE ??
THE MALWARE IS PROGRAMMED TO HIJACK CONNECTED IOT DEVICES THAT ARE
USING THE DEFAULT USERNAMES AND PASSWORDS SET BY THE FACTORY BEFORE
DEVICES ARE FIRST SHIPPED TO CUSTOMERS.
 THE ATTACK CODE HAS BUILT-IN SCANNERS THAT LOOK FOR VULNERABLE SMART
DEVICES IN HOMES AND ENROLL THEM INTO A NETWORK OF BOTNET.
WIN 50,000 $$$$$$$$
 non-profit research and development
organization MITRE has
challenged researchers to come up with new
ideas for detecting rogue IoT devices on a
network.
THE GOOD NEWS: YOU CAN
EARN $50,000 FOR YOUR
IDEA.
 We already have 6.5 billion to 8 billion IoT
devices connected to the Internet worldwide,
and the number is expected to reach 50
billion by 2020
 This Challenge is open FOR EVERYONE but
you have to participate in TEAM
YOU CAN GET HACKED BY OPENIONG JPEG
2000
RESEARCHERS HAVE DISCLOSED A CRITICAL ZERO-DAY
VULNERABILITY IN THE JPEG 2000 IMAGE FILE
DISCOVERED BY SECURITY RESEARCHERS AT CISCO TALOS GROUP,
THE ZERO-DAY FLAW, ASSIGNED AS TALOS-2016-0193/CVE-2016-
8332, COULD ALLOW AN OUT-OF-BOUND HEAP WRITE TO OCCUR
THAT TRIGGERS THE HEAP CORRUPTION AND LEADS TO ARBITRARY
CODE EXECUTION
COMPANY PATCHED THE FLAW LAST WEEK WITH THE RELEASE OF
VERSION 2.1.2.
THE VULNERABILITY HAS BEEN ASSIGNED A CVSS SCORE OF 7.5,
CATEGORIZING IT AS A HIGH-SEVERITY BUG.
324,000 FINANCIAL RECORDS WITH CVV
NUMBERS STOLEN FROM A PAYMENT
GATEWAY
 VICTIM- BLUESNAP
 AROUND 324,000 USERS HAVE LIKELY HAD
THEIR PAYMENT RECORDS STOLEN EITHER
FROM PAYMENT PROCESSOR BLUESNAP OR
ITS CUSTOMER REGPACK
 WHO SO EVER DID THIS IS NOT CLEAR BUT
THE STOLEN DATA IS FLOATING AROUND
THE WEB
 ALTHOUGH THE PAYMENT DATA DOES NOT
CONTAIN FULL CREDIT CARD NUMBER BUT
IT HAS EMAIL ADDRESSES, PHYSICAL
ADDRESSES, PHONE NUMBERS, IP
ADDRESSES, LAST FOUR DIGITS OF CREDIT
CARD NUMBERS, EVEN CVV CODES
NUMBERS WHICH IS ENOUGH FOR A
MASSIVE DATA BREACH EXPOSES 6.6
MILLION PLAINTEXT PASSWORDS FROM AD
COMPANY
VICTIM- CLIXSENSE
THE DATA BREACH HAS EXPOSED PLAINTEXT
PASSWORDS, USERNAMES,
EMAIL ADDRESSES, AND A LARGE TROVE OF OTHER
PERSONAL INFORMATION OF MORE THAN 6.6 M
CLIXSENSE USERS.
 LATEST VICTIM TO JOIN THE LIST OF "MEGA-BREACHES"
REVEALED IN RECENT MONTHS,
INCLUDING LINKEDIN,MYSPACE, VK.COM, TUMBLR,
AND DROPBOX.
MORE THAN 2.2 MILLION DATA POSTED ON PASTEBIN
OVER THE WEEKEND. ANOTHER 4.4 MILLION ACCOUNTS
UP FOR SALE.
CLIXSENSE ADMITTED THE DATA BREACH AND SAID
Another Day, Another Data Breach!
BLOCKCHAIN.INFO DOMAIN HIJACKED; SITE
GOES DOWN; 8 MILLION BITCOIN WALLETS
INACCESSIBLE
 BLOCKCHAIN.INFO, THE WORLD'S MOST
POPULAR BITCOIN WALLET AND BLOCK
EXPLORER SERVICE, HAS BEEN DOWN
FROM LAST FEW HOURS, AND IT'S BELIEVED
THAT A POSSIBLE CYBER ATTACK HAS
DISRUPTED THE SITE.
 WITH MORE THAN 8 MILLION DIGITAL
WALLET CUSTOMERS, BLOCKCHAIN IS USERS'
FAVORITE DESTINATION TO SEE RECENT
TRANSACTIONS, STATS ON MINED BLOCKS
AND BITCOIN ECONOMY CHARTS.
 SINCE ITS DNS SERVER HAS BEEN HIJACKED,
IT COULD BE POSSIBLE THAT AN ATTACKER
CAN HOST A FAKE WEB PAGE ON THE SAME
DOMAIN IN AN EFFORT TO STEAL YOUR
BITCOIN WALLET CREDENTIALS.
MP-ONLINE
HACKED
 THE COUNCELLING OF PRIVATE MEDICAL
COLLEGE WAS AFFACTED
 ALL THE DETA REGUARDING THE
STUDENTS WERE GONE
 THE SITE WHICH WAS FACILITATING ADMISSION TO MEDICAL COLLEGE
WAS HACKED .
 AT MIDNIGHT STUDENTS GOT DEADLINE SMS FROM (DME )TO PRESENT
PHYSICALY AT (GMC) IN THE NEXT 8 HOURS WITH ALL THEIR DOCUMENTS.
MP-ONLINE HACKED
REFERENCE
• The times of india
• www.thehackersnews.com
• www.twiter.com
• www.news.ycombinator.com
THANK YOU VERY MUCH
FOR YOUR TIME

Más contenido relacionado

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

News bytes null bhopal 16-10-2016 by saurabh_chaudhary

  • 2. MAJOR HACKS OF THE MONTH• US SECRET DEFENCE NETWORK HACKED RESULTED IN THE DEATH OF 100 INOCENTS..!! • YOUR IOT DEVICE MAY HAVE CONTRIBUTED IN THE BIGGEST DDos ATTACK ..!!!!! • EARN 50,000$ !!! YOU HEARD IT RIGHT … • NTRIBUTED IN THE BIGGEST DDos ATTACK ..!!!!! • DO NOT OPEN JPEG2000….!! • 32,4000 FINANCIAL RECORD WITH CVV STOLEN .. • WORLD'S MOST FAMOUS BITCOIN WALLET WAS BREACHED • PLAINTEXT PASSWORDS AND COMPLETE WEB-SOURCE CODE ON SALEEEE…
  • 3. US AIRFORCE HACKED 62 SYRIAN SOLDIERS, 15 CIVILIANS IN AFGHANISTAN AND 22 SOMALI SOLDIERS WERE REPORTEDLY KILLED BY US DRONE STRIKES ON 9 SEPTEMBER 2016, THE SIPRNET SYSTEM CURRENTLY IN OPERATION AT CREECH AFB FAILED,  THE AIR FORCE IS INVESTIGATING THE CONNECTION BETWEEN THE FAILURE OF ITS CLASSIFIED NETWORK, DUBBED SIPRNET, AT CREECH AIR FORCE BASE  SIPRNET, OR SECRET INTERNET PROTOCOL ROUTER NETWORK, IS A GLOBAL UNITED STATES MILITARY INTERNET SYSTEM USED FOR TRANSMITTING CLASSIFIED INFORMATION,
  • 4. WORLDS LARGEST 1 TBPS DDOS ATTACK VICTIM-FRANCE-BASED HOSTING PROVIDER OVH POWERED BY 1500,000 HACKED IOT DEVICE.  ANNA-SENPAI HAS RELEASED THE SOURCE CODE FOR IOT BOTNET NAMED MARAI…. I AM STILL WONDERING WHY THE MALWARE'S AUTHOR CHOSE TO DUMP THE CODE ONLINE ?? THE MALWARE IS PROGRAMMED TO HIJACK CONNECTED IOT DEVICES THAT ARE USING THE DEFAULT USERNAMES AND PASSWORDS SET BY THE FACTORY BEFORE DEVICES ARE FIRST SHIPPED TO CUSTOMERS.  THE ATTACK CODE HAS BUILT-IN SCANNERS THAT LOOK FOR VULNERABLE SMART DEVICES IN HOMES AND ENROLL THEM INTO A NETWORK OF BOTNET.
  • 5. WIN 50,000 $$$$$$$$  non-profit research and development organization MITRE has challenged researchers to come up with new ideas for detecting rogue IoT devices on a network. THE GOOD NEWS: YOU CAN EARN $50,000 FOR YOUR IDEA.  We already have 6.5 billion to 8 billion IoT devices connected to the Internet worldwide, and the number is expected to reach 50 billion by 2020  This Challenge is open FOR EVERYONE but you have to participate in TEAM
  • 6. YOU CAN GET HACKED BY OPENIONG JPEG 2000 RESEARCHERS HAVE DISCLOSED A CRITICAL ZERO-DAY VULNERABILITY IN THE JPEG 2000 IMAGE FILE DISCOVERED BY SECURITY RESEARCHERS AT CISCO TALOS GROUP, THE ZERO-DAY FLAW, ASSIGNED AS TALOS-2016-0193/CVE-2016- 8332, COULD ALLOW AN OUT-OF-BOUND HEAP WRITE TO OCCUR THAT TRIGGERS THE HEAP CORRUPTION AND LEADS TO ARBITRARY CODE EXECUTION COMPANY PATCHED THE FLAW LAST WEEK WITH THE RELEASE OF VERSION 2.1.2. THE VULNERABILITY HAS BEEN ASSIGNED A CVSS SCORE OF 7.5, CATEGORIZING IT AS A HIGH-SEVERITY BUG.
  • 7. 324,000 FINANCIAL RECORDS WITH CVV NUMBERS STOLEN FROM A PAYMENT GATEWAY  VICTIM- BLUESNAP  AROUND 324,000 USERS HAVE LIKELY HAD THEIR PAYMENT RECORDS STOLEN EITHER FROM PAYMENT PROCESSOR BLUESNAP OR ITS CUSTOMER REGPACK  WHO SO EVER DID THIS IS NOT CLEAR BUT THE STOLEN DATA IS FLOATING AROUND THE WEB  ALTHOUGH THE PAYMENT DATA DOES NOT CONTAIN FULL CREDIT CARD NUMBER BUT IT HAS EMAIL ADDRESSES, PHYSICAL ADDRESSES, PHONE NUMBERS, IP ADDRESSES, LAST FOUR DIGITS OF CREDIT CARD NUMBERS, EVEN CVV CODES NUMBERS WHICH IS ENOUGH FOR A
  • 8. MASSIVE DATA BREACH EXPOSES 6.6 MILLION PLAINTEXT PASSWORDS FROM AD COMPANY VICTIM- CLIXSENSE THE DATA BREACH HAS EXPOSED PLAINTEXT PASSWORDS, USERNAMES, EMAIL ADDRESSES, AND A LARGE TROVE OF OTHER PERSONAL INFORMATION OF MORE THAN 6.6 M CLIXSENSE USERS.  LATEST VICTIM TO JOIN THE LIST OF "MEGA-BREACHES" REVEALED IN RECENT MONTHS, INCLUDING LINKEDIN,MYSPACE, VK.COM, TUMBLR, AND DROPBOX. MORE THAN 2.2 MILLION DATA POSTED ON PASTEBIN OVER THE WEEKEND. ANOTHER 4.4 MILLION ACCOUNTS UP FOR SALE. CLIXSENSE ADMITTED THE DATA BREACH AND SAID Another Day, Another Data Breach!
  • 9. BLOCKCHAIN.INFO DOMAIN HIJACKED; SITE GOES DOWN; 8 MILLION BITCOIN WALLETS INACCESSIBLE  BLOCKCHAIN.INFO, THE WORLD'S MOST POPULAR BITCOIN WALLET AND BLOCK EXPLORER SERVICE, HAS BEEN DOWN FROM LAST FEW HOURS, AND IT'S BELIEVED THAT A POSSIBLE CYBER ATTACK HAS DISRUPTED THE SITE.  WITH MORE THAN 8 MILLION DIGITAL WALLET CUSTOMERS, BLOCKCHAIN IS USERS' FAVORITE DESTINATION TO SEE RECENT TRANSACTIONS, STATS ON MINED BLOCKS AND BITCOIN ECONOMY CHARTS.  SINCE ITS DNS SERVER HAS BEEN HIJACKED, IT COULD BE POSSIBLE THAT AN ATTACKER CAN HOST A FAKE WEB PAGE ON THE SAME DOMAIN IN AN EFFORT TO STEAL YOUR BITCOIN WALLET CREDENTIALS.
  • 10. MP-ONLINE HACKED  THE COUNCELLING OF PRIVATE MEDICAL COLLEGE WAS AFFACTED  ALL THE DETA REGUARDING THE STUDENTS WERE GONE  THE SITE WHICH WAS FACILITATING ADMISSION TO MEDICAL COLLEGE WAS HACKED .  AT MIDNIGHT STUDENTS GOT DEADLINE SMS FROM (DME )TO PRESENT PHYSICALY AT (GMC) IN THE NEXT 8 HOURS WITH ALL THEIR DOCUMENTS.
  • 12. REFERENCE • The times of india • www.thehackersnews.com • www.twiter.com • www.news.ycombinator.com
  • 13. THANK YOU VERY MUCH FOR YOUR TIME