Researchers have discovered that the developer of SafeBrowse Chrome extension with more than 140,000 users has inserted a JavaScript library in the extension's code that consumes the CPU and mines for the Monero cryptocurrency using users' machines and without getting their approval.
Equifax has confirmed that a web server vulnerability in Apache Struts that it failed to fix months ago was to blame for the data breach. The company said that attackers used an Apache Struts security flaw to hack its servers.
The loosely based hacking group Anonymous is breaking headlines nearly everyday for their latest operations and hacks. These include awesome animal rights hacks
Security researchers (Steven Seeley (mr_me) and Ariele Caltabiano (kimiya)) have found two dangerous zero-day security vulnerabilities in Foxit Reader, the vulnerabilities are Command Injection and File Write bugs that can be triggered through the JavaScript API in Foxit PDF Reader.

Black Lives Matter cashes in with $100 million from liberal foundations
Hacked Documents: Soros Funded Black Lives Matter
Major donors consider funding Black Lives Matter
Globalist Soros Exposed Funding Over 50 Organizations in Women’s March on DC
Soros Caught Red-Handed Funding Anti-Trump Prote
Read More
sts, Paying
Protesters $15/hr

Billionaire George Soros has ties to more than 50 ‘partners’ of the Women’s March on Washington
Refuse Fascism’ Group Behind Berkeley Riot Received $50k from George Soro
"Unite the Right" is a Soros-funded honeypot psyop that employs the "Pied Piper" strategy
more Info on Soros:

Pastebin : Transcript

Resistance TV Network
Secret Anonymous Idea:
Anonymous Construct

And All Brothers and Sisters of the Collective Idea.
Thank you for watching.
Britain’s Home Office is ready to invest more in facial recognition technology for police forces despite claims it infringes civil liberties. The technology, which matches images of people’s faces with a police database, could be in breach of the right to privacy.
(Almost) everything you need to repair Windows problems in one small handy tool.
An all-in-one repair tool to help fix a large
majority of known Windows problems including registry errors and file
permissions as well as issues with Internet Explorer, Windows Update, Windows
Firewall and more. Malware and installed programs can modify your default settings.
With Tweaking.com - Windows Repair you can restore Windows original settings.
The Dark Web is now having a tough weekend since the hacker group affiliated with Anonymous managed to break into servers of Freedom Hosting II to take down
SAFE Network Alpha Release!
Create your first SAFE website, store private data, host websites and share public data!
The online hacktivist group Anonymous along with their counterparts from HackBack movement have hacked and defaced the official website of The Bilderberg Group also known as Bilderberg Club, Bilderberg meetings and Bilderberg conference, an annual private conference of 120 to 150 people of the North American and European political elite, media personalities, industrial and finance giants established in 1954.
Launched in 2009, Shodan is a prying eye across the world through the IoT. Named as 'scariest search engine', it is the Hacker Search Engine
BlackArch Linux 2016.12.20 has just been released. The new ISO respins come with Linux kernel 4.8.13 and more than 100 new tools
Next time when you hear an announcement in the flight, “Ladies and gentlemen, this is your captain speaking…," the chances are that the announcement is coming from a hacker controlling your flight.
Dangerous vulnerabilities in an in-flight entertainment system used by the leading airlines, including Emirates, United, American Airlines, Virgin, and Qatar, could let hackers hijack several flight systems and even take control of the plane.
Mirai malware which attacks the Internet of things devices to perform Distributed Denial of Service attacks is now improving itself by switching to .Onion domains, after it made a few tweaks to its Domain Generation Algorithm(DGA).

The world needs truthtellers. They need Courage.

Justin Liverman – emergency appeal

The United States Department of Justice has accused computer science student Justin Liverman of being associated with Crackas with Attitude (CWA), the group that claimed to have accessed emails from the AOL account of CIA Director John Brennan in late 2015 and brought to widespread attention the vulnerability of a variety of US government computer systems to social engineering attacks.
​Yahoo acknowledged yesterday that hackers breached its systems and stole approximately 1 billion accounts, and now it turns out that the full database is a..

Wikileaks founder Julian Assange denied Thursday that hacked emails from the Democratic National Committee and Hillary Clinton's campaign chairman John Podesta were stolen and passed to his organization by Russian state actors. 

Back in November, it was discovered that a backdoor injected in a custom firmware powering nearly 700 million phones was being used to collect user informat

In this post I’ll describe how I found a remote code execution bug in Ubuntu Desktop which affects all default installations >= 12.10 (Quantal). The bug allows for reliable code injection when a user simply opens a malicious file. The following video demonstrates the exploit opening the Gnome calculator. The executed payload also replaces the exploit file with a decoy zip file to cover its tracks.

Remember The Shadow Brokers?
The hacker group that's believed to be behind the high-profile cyber theft of NSA hacking tools and exploits that sparked a larger debate on the Internet concerning abilities of US intelligence agencies and their own security
Newly observed variants of the Mirai botnet pack domain generation algorithm (DGA) features that haven’t been associated with previous Mirai samples, security researchers warn.
Lauri Love could be locked up in solitary confinement for years in America's "barbaric" prison system, even if he is eventually cleared, says his lawyer
Adlice PEViewer (RogueKillerPE) FREE Download - Portable Executable parser for files and processes, with heuristics driven maliciousness score.