Explains how to secure Memcached server to avoid DDoS (Distributed Denial of Service) amplification attacks based on Memcached on Linux or Unix-like system.


▂▃▅▇█▓▒░Anon(Ḧḭṽḕ)░▒▓█▇▅▃▂ ====================================================== Death of Heartprogress ====================================================...



In the current era of mass malware it's becoming increasingly rare to find something beyond the ‘usual suspects’ we see being spread by high-profile botnets on a regular basis. However, in amongst the digital haystack there exists the occasional needle: we recently came across a sample apparently disguised as a LogMeIn service pack which generated notable amounts of 'unusual' DNS requests. Deeper investigation revealed something of a flawed gem, ultimately designed to steal magnetic stripe payment card data: a hallmark of ATM/PoS malware.


An unpatched application-level denial of service (DoS) vulnerability in WordPress websites could help hackers take down nearly any WordPress website


Security researchers have discovered more than 130 malware samples trying to exploit Spectre and Meltdown chip flaws.


On Tuesday, News said a bug lets any software gain entrance to parts of a computer’s memory that are set out to preserve things like passwords. All machines with Intel chips from the past 10 years appear to be touched, the report said, and updates to Microsoft Corp.’s Windows and Mac OS will be required. The security updates may slow down older device by as much as 30 percent, according to News.


Discovered by UpGuard defense researcher Chris Vickery, the databases were entitled “CENTCOM-backup,” “CENTCOM-archive,” and “pacom-archive.”

Based on their titles, it was obvious the databases related to US Central Command (CENTCOM) and US Pacific Command (PACOM), two of the DOD’s combatant command operations.

According to the researcher, the data received from the databases did not include any sensible details. Instead, the databases were constructed by scraping the Internet for publicly available social media posts, forum post

Read More
s, blogs, news comments, and similar postings.


National Security Agency or the NSA as we know it is America’s most influential intelligence agency. Previously fairly anonymous to masses; the agency came in the news when one of its ex-contractors Edward Snowden started releasing highly sensitive data exposing how the NSA secretly

Read More
spied on millions of people around the world and stored data on unsuspecting populous.


A group of Muslim hacktivists from Ahlus Sunnah Wal Jamaah, the Sunni sect of Islam and going by the online handle of Di5s3nSi0N hacked the official website of ISIS/ISIL (Daesh) and leaked a list of more than 2000 people who had subscribed to the site’s newsletter and updates through email.


Bkav (security firm) said that it was able to bypass the iPhone X's Face ID system using a specially crafted mask


Nothing is free in this world.

If you are searching for free hacking tools on the Internet, then beware—most freely available tools, claiming to be the swiss army knife for hackers, are nothing but a scam.

For example, Cobian RAT and a Facebook hacking tool that we previously reported on The Hacker News actually could hack, but of the one who uses them a

Read More
nd not the one you desire to hack.


Message From Ṫḧḕ Ḧḭṽḕ: Message For The People on Pedos Hollywood and Antifa ▂▃▅▇█▓▒░Anon(Ḧḭṽḕ)░▒▓█▇▅▃▂ ===================================================== ...



For unsuspecting users, the fact that printers can be used to conduct cyber attacks is difficult to believe but then when a coffee maker can infect devices with ransomware then why not printers. Recently, IT security researchers at Trustwave discovered a critical vulnerability in printers manufactured by Brother Industries, Ltd., a Japanese multinational electronics and electrical equipment company.


By Waqas on October 23, 2017 Email @hackread MALWARE SECURITY

Reaper malware outshines Mirai; hits millions of IoT devices worldwide



Share on FacebookShare on Twitter

Last year the world was startled when Mirai malware managed to infect a whopping 500,000 IoT devices and formed a massive army of

Read More
botnets and then disrupted internet service in the US and Europe through launching DDoS attacks. The haunting memories are brought back to our attention with the emergence of malware that is trying to perform similar acts.


D-Link Middle East Website Caught Running Hidden Cryptocurrency Mining JavaScript—Or Was It Hacked?


Last month the popular torrent website The Pirate Bay caused some uproar by adding a Javascript-based cryptocurrency miner to its site with no opt-out option, utilizing visitors' CPU power to mine Monero coins in an attempt to gain an extra source of revenue.

Now D-Link has been caught doing the same, although there's high chance that its website has been hacked.

D-Link's official website for Middle East (www

Read More
.dlinkmea.com) has been found secretly adding a JavaScript-based cryptocurrency miner, according to a blog post published by security firm Seekurity on Tuesday.


ANONYMOUS DECLARES WAR ON ANTIFA 2017 Orginal Channel : https://m.youtube.com/user/TheRjingle


Cybercriminals apparently are well aware of the fact that Minecraft is a truly profitable gameperhaps that’s why they are eager on identifying new ways of exploiting it. Reportedly, there are a number of Minecraft oriented Android apps available on Google Play Store that are infecting devices and turning them into botnets.


As if the UK hasn't had enough drug problems to deal with, a 19 year old decided to make things much worse. The teen was arrested for allegedly...

Infected CCleaner Software Attack that Affected 700,000 Customers is part of a Wide-scale State-sponsored Cyber-espionage Campaign.
Researchers have discovered that the developer of SafeBrowse Chrome extension with more than 140,000 users has inserted a JavaScript library in the extension's code that consumes the CPU and mines for the Monero cryptocurrency using users' machines and without getting their approval.
Equifax has confirmed that a web server vulnerability in Apache Struts that it failed to fix months ago was to blame for the data breach. The company said that attackers used an Apache Struts security flaw to hack its servers.
The loosely based hacking group Anonymous is breaking headlines nearly everyday for their latest operations and hacks. These include awesome animal rights hacks
Security researchers (Steven Seeley (mr_me) and Ariele Caltabiano (kimiya)) have found two dangerous zero-day security vulnerabilities in Foxit Reader, the vulnerabilities are Command Injection and File Write bugs that can be triggered through the JavaScript API in Foxit PDF Reader.

Black Lives Matter cashes in with $100 million from liberal foundations
Hacked Documents: Soros Funded Black Lives Matter
Major donors consider funding Black Lives Matter
Globalist Soros Exposed Funding Over 50 Organizations in Women’s March on DC
Soros Caught Red-Handed Funding Anti-Trump Prote
Read More
sts, Paying
Protesters $15/hr

Billionaire George Soros has ties to more than 50 ‘partners’ of the Women’s March on Washington
Refuse Fascism’ Group Behind Berkeley Riot Received $50k from George Soro
"Unite the Right" is a Soros-funded honeypot psyop that employs the "Pied Piper" strategy
more Info on Soros:

Pastebin : Transcript

Resistance TV Network
Secret Anonymous Idea:
Anonymous Construct

And All Brothers and Sisters of the Collective Idea.
Thank you for watching.
Britain’s Home Office is ready to invest more in facial recognition technology for police forces despite claims it infringes civil liberties. The technology, which matches images of people’s faces with a police database, could be in breach of the right to privacy.
(Almost) everything you need to repair Windows problems in one small handy tool.
An all-in-one repair tool to help fix a large
majority of known Windows problems including registry errors and file
permissions as well as issues with Internet Explorer, Windows Update, Windows
Firewall and more. Malware and installed programs can modify your default settings.
With Tweaking.com - Windows Repair you can restore Windows original settings.
What is DisDroid?

DisDroid is the new black.

BMC logoBuy me a coffee
Latest Comments