1

Discovered by UpGuard defense researcher Chris Vickery, the databases were entitled “CENTCOM-backup,” “CENTCOM-archive,” and “pacom-archive.”



Based on their titles, it was obvious the databases related to US Central Command (CENTCOM) and US Pacific Command (PACOM), two of the DOD’s combatant command operations.



According to the researcher, the data received from the databases did not include any sensible details. Instead, the databases were constructed by scraping the Internet for publicly available social media posts, forum post

Read More
s, blogs, news comments, and similar postings.


1

National Security Agency or the NSA as we know it is America’s most influential intelligence agency. Previously fairly anonymous to masses; the agency came in the news when one of its ex-contractors Edward Snowden started releasing highly sensitive data exposing how the NSA secretly

Read More
spied on millions of people around the world and stored data on unsuspecting populous.


1

A group of Muslim hacktivists from Ahlus Sunnah Wal Jamaah, the Sunni sect of Islam and going by the online handle of Di5s3nSi0N hacked the official website of ISIS/ISIL (Daesh) and leaked a list of more than 2000 people who had subscribed to the site’s newsletter and updates through email.


1

Bkav (security firm) said that it was able to bypass the iPhone X's Face ID system using a specially crafted mask


1

Nothing is free in this world.



If you are searching for free hacking tools on the Internet, then beware—most freely available tools, claiming to be the swiss army knife for hackers, are nothing but a scam.



For example, Cobian RAT and a Facebook hacking tool that we previously reported on The Hacker News actually could hack, but of the one who uses them a

Read More
nd not the one you desire to hack.


1

Message From Ṫḧḕ Ḧḭṽḕ: Message For The People on Pedos Hollywood and Antifa ▂▃▅▇█▓▒░Anon(Ḧḭṽḕ)░▒▓█▇▅▃▂ ===================================================== ...



 




1

For unsuspecting users, the fact that printers can be used to conduct cyber attacks is difficult to believe but then when a coffee maker can infect devices with ransomware then why not printers. Recently, IT security researchers at Trustwave discovered a critical vulnerability in printers manufactured by Brother Industries, Ltd., a Japanese multinational electronics and electrical equipment company.


1

By Waqas on October 23, 2017 Email @hackread MALWARE SECURITY



Reaper malware outshines Mirai; hits millions of IoT devices worldwide



3008



SHARES



Share on FacebookShare on Twitter



Last year the world was startled when Mirai malware managed to infect a whopping 500,000 IoT devices and formed a massive army of

Read More
botnets and then disrupted internet service in the US and Europe through launching DDoS attacks. The haunting memories are brought back to our attention with the emergence of malware that is trying to perform similar acts.


1

D-Link Middle East Website Caught Running Hidden Cryptocurrency Mining JavaScript—Or Was It Hacked?



 



Last month the popular torrent website The Pirate Bay caused some uproar by adding a Javascript-based cryptocurrency miner to its site with no opt-out option, utilizing visitors' CPU power to mine Monero coins in an attempt to gain an extra source of revenue.



Now D-Link has been caught doing the same, although there's high chance that its website has been hacked.



D-Link's official website for Middle East (www

Read More
.dlinkmea.com) has been found secretly adding a JavaScript-based cryptocurrency miner, according to a blog post published by security firm Seekurity on Tuesday.


1

ANONYMOUS DECLARES WAR ON ANTIFA 2017 Orginal Channel : https://m.youtube.com/user/TheRjingle




1

Cybercriminals apparently are well aware of the fact that Minecraft is a truly profitable gameperhaps that’s why they are eager on identifying new ways of exploiting it. Reportedly, there are a number of Minecraft oriented Android apps available on Google Play Store that are infecting devices and turning them into botnets.


1

As if the UK hasn't had enough drug problems to deal with, a 19 year old decided to make things much worse. The teen was arrested for allegedly...


1
Infected CCleaner Software Attack that Affected 700,000 Customers is part of a Wide-scale State-sponsored Cyber-espionage Campaign.
1
Researchers have discovered that the developer of SafeBrowse Chrome extension with more than 140,000 users has inserted a JavaScript library in the extension's code that consumes the CPU and mines for the Monero cryptocurrency using users' machines and without getting their approval.
1
Equifax has confirmed that a web server vulnerability in Apache Struts that it failed to fix months ago was to blame for the data breach. The company said that attackers used an Apache Struts security flaw to hack its servers.
1
The loosely based hacking group Anonymous is breaking headlines nearly everyday for their latest operations and hacks. These include awesome animal rights hacks
2
Security researchers (Steven Seeley (mr_me) and Ariele Caltabiano (kimiya)) have found two dangerous zero-day security vulnerabilities in Foxit Reader, the vulnerabilities are Command Injection and File Write bugs that can be triggered through the JavaScript API in Foxit PDF Reader.
1


Black Lives Matter cashes in with $100 million from liberal foundations
http://www.washingtontimes.com/news/2...
Hacked Documents: Soros Funded Black Lives Matter
https://www.thenewamerican.com/usnews...
Major donors consider funding Black Lives Matter
http://www.politico.com/story/2015/11...
Globalist Soros Exposed Funding Over 50 Organizations in Women’s March on DC
http://thefreethoughtproject.com/soro...
Soros Caught Red-Handed Funding Anti-Trump Prote
Read More
sts, Paying
Protesters $15/hr

http://thefreethoughtproject.com/soro...
https://shadowproof.com/2017/02/25/pr...
Billionaire George Soros has ties to more than 50 ‘partners’ of the Women’s March on Washington
http://nytlive.nytimes.com/womeninthe...
Refuse Fascism’ Group Behind Berkeley Riot Received $50k from George Soro
http://www.breitbart.com/milo/2017/02...
"Unite the Right" is a Soros-funded honeypot psyop that employs the "Pied Piper" strategy
https://www.reddit.com/r/The_Donald/c...
more Info on Soros:
http://www.discoverthenetworks.org/in...

Pastebin : Transcript
https://pastebin.com/FexRdNL4

AnonymousTV:
https://www.youtube.com/channel/UCQEX...
Resistance TV Network
https://www.youtube.com/channel/UCAUr...
Secret Anonymous Idea:
https://www.youtube.com/channel/UCepZ...
Anonymous Construct
https://www.youtube.com/user/knightma...
AnonHive
https://www.youtube.com/user/revmantis
FearlessOne
https://www.youtube.com/channel/UC3wR...

And All Brothers and Sisters of the Collective Idea.
Thank you for watching.
1
Britain’s Home Office is ready to invest more in facial recognition technology for police forces despite claims it infringes civil liberties. The technology, which matches images of people’s faces with a police database, could be in breach of the right to privacy.
2
(Almost) everything you need to repair Windows problems in one small handy tool.
2
An all-in-one repair tool to help fix a large
majority of known Windows problems including registry errors and file
permissions as well as issues with Internet Explorer, Windows Update, Windows
Firewall and more. Malware and installed programs can modify your default settings.
With Tweaking.com - Windows Repair you can restore Windows original settings.
1
The Dark Web is now having a tough weekend since the hacker group affiliated with Anonymous managed to break into servers of Freedom Hosting II to take down
1
SAFE Network Alpha Release!
Create your first SAFE website, store private data, host websites and share public data!
1
The online hacktivist group Anonymous along with their counterparts from HackBack movement have hacked and defaced the official website of The Bilderberg Group also known as Bilderberg Club, Bilderberg meetings and Bilderberg conference, an annual private conference of 120 to 150 people of the North American and European political elite, media personalities, industrial and finance giants established in 1954.
1
Launched in 2009, Shodan is a prying eye across the world through the IoT. Named as 'scariest search engine', it is the Hacker Search Engine
1
BlackArch Linux 2016.12.20 has just been released. The new ISO respins come with Linux kernel 4.8.13 and more than 100 new tools