Tier3 monitoring teams have detected that Public Procurement Regulatory Authority (PPRA) official website ppra.org.pk was earlier this morning by a hacker group "The Crash Rulers" . It is the same group that supposedly hacked Pakistan ... Read More
US officials say their attacks on Iranian military computers disabled systems that control missile and rocket launchers. The United States military launched cyberattacks against Iranian missile control systems and a spy network on Thursday after ... Read More
Scanbox framework used to hack Pakistani Govt’s passport application tracking site http://tracking.dgip.gov.pk Experts uncovered a watering hole attack against the Pakistani Govt’s passport application tracking site, hackers used the Scanbox Framework to steal visitors’ data ... Read More
Hackers were able to use the vulnerability and install other malware on phones. After 2 Weeks WhatsApp confirms its 1.5 Billion users need an upgrade. WhatsApp the most popular messenger app, is also owned by ... Read More
Fileless malware attacks are increasing every day.They can nowadays be seen as the perfect crime of opportunity. The initial vector of these attack can be a seemingly innocuous business email with a link to an ... Read More
In a latest security alert email sent by PKNIC (registrar of all .PK domains ) to its customers, it is reported that there has been an increase in cyber attacks on Pakistani IT installations in ... Read More
Even if security experts continue to make awareness campaign, people continue to use bad passwords exposing their data to the risk of hack. Bad habits are hard to die, 123456 is the most used password ... Read More
1. Do not give any personal information (name, address, bank details, email or phone number) to organisations or people before verifying their credentials. Always question unsolicited calls, texts or emails requesting your personal or financial ... Read More
Payment/ bank card fraud involves the compromise of any personal information from credit, debit or store cards. The personal information stolen from a card, or the theft of a card itself, can be used to ... Read More
Karachi-based Bank Islami acknowledged on Sunday of suffering a security breach of its payment cards system but denied reports of having lost an alleged $6 million in what local press have called the biggest cyber-attack ... Read More
malicious reconnaissance campaign that targets websites. It is unknown what is the intent behind the campaign as of this writing, however, the profile of the targets resembles those that are common targets of Advanced Persistent Threat (APT) actors. As the attack is currently active, it effectively turns compromised sites into attack surfaces against their visitors.
Hacktivist group Anonymous hacks the company servers Freedom Hosting II and lay down some 10,000 web pages based on Tor, representing almost 20% of the web deep. Hackers claim that at least half of the web pages were child pornography.
If the user have JAVA (or python or similar interpreters) an attacker can insert jar file or py file into the presentation and trigger it when mouse moves, for easier exploitation the attacker can use ppsx file which will load automatically in presentation mode and once the user opens the file and moves mouse it will trigger the payload.
The move by the technology companies, which is expected to begin in early 2017, aims to assuage government concerns and derail proposed new federal legislation over social media content that is seen as increasingly driving ‘recruitment’ and ‘radicalization’, while also balancing free speech issues.In Pakistan , people can use Surf Safe Pakistan web portal to report terrorist and extremist content online.
CK uses a well known shell as a backdoor which is known as the WSO shell. It stores the backdoor in a file called wp-ajax.php which is made to look like a legitimate WordPress core file.It is affecting wordpress websites all around the world and specially in Pakistan on industrial scale.