1. IT-Security >
  2. Hacking


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Hacking


Suchen

85 Malicious Android Apps Discovered in Google Play Store that Affected 9 Million Users

Hacking vom 09.01.2019 um 07:35 Uhr | Quelle gbhackers.com
Adware Apps

Researchers discovered around 85 malicious adware apps from Google play store that downloads more than 9 million Android users around the world. These 85 malicious apps uploaded under various categories on the Google Play store such as game, TV, and remote control simulator apps. This adware family detect as AndroidOS_HidenAd and apps are capable of […]

The post 85 Malicious Android Apps Discovered in Google Play Store that Affected 9 Million Users appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

Adobe addresses ‘Important’ Flaws in Connect, Digital Editions

Hacking vom 09.01.2019 um 07:15 Uhr | Quelle securityaffairs.co

Adobe’s Patch Tuesday security updates for January 2019 fix two flaws rated as “important” in the Connect and Digital Editions products. Adobe’s Patch Tuesday security updates for January 2019 fix two “important” vulnerabilities in the Connect and Digital Editions ebook reader products. The first flaw, tracked as CVE-2018-19718, is a session token exposure issue that […]

The post Adobe addresses ‘Important’ Flaws in Connect, Digital Editions appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Adobe addresses ‘Important’ Flaws in Connect, Digital Editions

Hacking vom 09.01.2019 um 07:15 Uhr | Quelle securityaffairs.co

Adobe’s Patch Tuesday security updates for January 2019 fix two flaws rated as “important” in the Connect and Digital Editions products. Adobe’s Patch Tuesday security updates for January 2019 fix two “important” vulnerabilities in the Connect and Digital Editions ebook reader products. The first flaw, tracked as CVE-2018-19718, is a session token exposure issue that […]

The post Adobe addresses ‘Important’ Flaws in Connect, Digital Editions appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Wireshark Can Be crashed By Injecting a Malformed Packet

Hacking vom 09.01.2019 um 05:06 Uhr | Quelle gbhackers.com
Wireshark 2.6.6 & 2.4.12

The New version of Wireshark released with the fix for vulnerabilities, number of bugs and with updated protocols support. Wireshark is the most popular network protocol analyzer used for analyzing network packets by organizations and individuals worldwide. With The new versions of Wireshark come with the fix for security vulnerabilities that could crash the dissector. […]

The post Wireshark Can Be crashed By Injecting a Malformed Packet appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

Wireshark Can Be crashed By Injecting a Malformed Packet

Hacking vom 09.01.2019 um 05:06 Uhr | Quelle gbhackers.com
Wireshark 2.6.6 & 2.4.12

The New version of Wireshark released with the fix for vulnerabilities, number of bugs and with updated protocols support. Wireshark is the most popular network protocol analyzer used for analyzing network packets by organizations and individuals worldwide. With The new versions of Wireshark come with the fix for security vulnerabilities that could crash the dissector. […]

The post Wireshark Can Be crashed By Injecting a Malformed Packet appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

http://www.arroiodotigre.rs.gov.br/BLVD.txt

Hacking vom 09.01.2019 um 04:26 Uhr | Quelle zone-h.org
http://www.arroiodotigre.rs.gov.br/BLVD.txt notified by xXXx.BLV
Newsbewertung

Weiterlesen

http://www.arroiodotigre.rs.gov.br/BLVD.txt

Hacking vom 09.01.2019 um 04:26 Uhr | Quelle zone-h.org
http://www.arroiodotigre.rs.gov.br/BLVD.txt notified by xXXx.BLV
Newsbewertung

Weiterlesen

Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers

Hacking vom 09.01.2019 um 03:42 Uhr | Quelle gbhackers.com
Email spoofing

Email spoofing is the way of delivering forged emails to recipients.These methods are used by criminals to launch attacks like phishing or spams to provide persistent backdoors with legitimate behavior. Publicly available email servers can be used for spoofing attack. If you have configured your mail server with OPEN RELAY, this dangerous email spoofing attack can be performed by […]

The post Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

German youngster behind massive data leak of German politicians data

Hacking vom 08.01.2019 um 23:26 Uhr | Quelle securityaffairs.co

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians. According to the authorities, the man had already confessed. The German authorities have identified a 20-year-old hacker that stole and leaked personal data belonging to hundreds of German politicians. According to the authorities, the youngster, who lives with […]

The post German youngster behind massive data leak of German politicians data appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Das oberste US-Gericht lehnt den Fall von Fiat Chrysler Hacking ab

Hacking vom 08.01.2019 um 21:37 Uhr | Quelle google.com
Das oberste US-Gericht lehnt den Fall von Fiat Chrysler Hacking ab ... Übergriffe seiner Jeeps und anderer Lastwagen auf Hacking abgelehnt. Dies ist ...
Newsbewertung

Weiterlesen

Buy U.K (ENGLAND) phone numbers databases.

Hacking vom 08.01.2019 um 19:39 Uhr | Quelle breachforums.com
Buy U.K phone numbers databases.

Hello
We want to buy Particulars/mobiles Databases of U.K
We are interested in buying a big amount of registers
What we need within the database is:
City (mandatory)
Address (preferably)
Age (preferably)
Answers and any doubts, you can reach me over here or contact :
E-mail: [email protected]
Skype: live:martincooper.direct
Telegram: https://t.me/x3473n
Newsbewertung

Weiterlesen

The January 2019 Security Update Review

Hacking vom 08.01.2019 um 19:32 Uhr | Quelle thezdi.com

A new year is upon us and with it comes the latest in security offerings from Adobe and Microsoft. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month.

Adobe Patches for January 2019

Adobe kicked off the new year by releasing an unscheduled update for Adobe Acrobat and Reader on January 3rd. Unlike most of their unscheduled releases, this one does not address anything being actively exploited. The two critical-rated CVEs it fixes were both reported through the ZDI program. The security bypass reported by ZDI researcher Abdul-Aziz Hariri was the result of a previously released security patch that didn’t quite fix what it intended to fix. The other CVE is a use-after-free (UAF) bug that was fast approaching the 120-day disclosure deadline. Again, neither were publicly known or under active attack at the time of release.

Today, Adobe released additional security patches for Flash, Connect, and Adobe Digital Editions. The Flash patch actually just provides bug fixes and does not address any security bugs. The Connect patch addresses a single CVE correcting a security token exposure. Similarly, the patch for Digital Editions patches one CVE fixing an out of bounds read. None of these issues are listed as being publicly known or under active attack at the time of release.

Microsoft Patches for January 2019 

Microsoft begins 2019 with 49 security patches and two advisories covering Internet Explorer (IE), Edge, ChakraCore, Microsoft Windows, Office and Microsoft Office Services and Web Apps, Visual Studio, and the .NET Framework. Of these 49 CVEs, 7 are listed as Critical, 40 are rated Important, and two are rated Moderate in severity. A total of 10 of these CVEs came through the ZDI program. One of these bugs is listed as publicly known at the time of release and none are reported as being actively exploited.

Let’s take a closer look at some of the more interesting patches for this month, starting with a disconcerting bug in the Windows DHCP client:

-       CVE-2019-0547 – Windows DHCP Client Remote Code Execution Vulnerability
If you are running Windows 10 or Server version 1803, this patch has to be on the top of your deployment list. A bug in the DHCP client could allow attackers to execute their code on affected systems. Code execution through a widely available listening service means this is a wormable bug. Microsoft also gives this its highest Exploit Index rating, meaning the bug is highly exploitable. It’s interesting the vulnerability exists in the latest version of the OS but not previous ones. It’s likely due to the component being re-written for the newer systems. Regardless, definitely put this in your “patch now” category.

-       CVE-2019-0586 – Microsoft Exchange Memory Corruption Vulnerability
This corrects a bug in Exchange that could allow an attacker to take control of an Exchange server just by sending it a specially crafted email. That’s a bit of a problem, as receiving emails is a big part of what Exchange is meant to do. Microsoft lists this as Important in severity, but taking over an Exchange server by simply sending it an email puts this in the Critical category to me. If you use Exchange, definitely put this high on your test and deploy list.

-       CVE-2019-0550, CVE-2019-0551 – Windows Hyper-V Remote Code Execution Vulnerability
These are two different CVEs, but I grouped them together as they have the same exploit scenario and impact. For both cases, a user on a guest virtual machine could execute code on the underlying hypervisor OS. The root cause for both of these bugs goes back to the failure to properly validate user input. Although titled as “remote code execution,” these bugs require an attacker to execute code on the guest OS. At last year’s Pwn2Own, these bugs could have earned up to $250,000 USD for a participant. This year’s event will also likely include large payouts for Hyper-V exploits. Let’s hope we see some bugs like these demonstrated at the contest.

-       CVE-2019-0622 – Skype for Android Elevation of Privilege Vulnerability
Although not as severe as some of the other bugs addressed this month, this patch covers a bug in Skype for Android that could bypass the lock screen. Obviously, an attacker would need physical access to your phone to do this. According to published reports, a fix for this was included in the December 23 release of Skype, so this release is primarily documenting the details. Although Microsoft does not list this as publicly known, the researcher posted a YouTube video demonstrating the vulnerability back on December 31. To get the update, you’ll need to manually access the Google Play store and update the Skype app from there.

Here’s the full list of CVEs released by Microsoft for January 2019.

CVE Title Severity Public Exploit XI - Latest XI - Older Type
CVE-2019-0579 Jet Database Engine Remote Code Execution Vulnerability Important Yes No 3 3 RCE
CVE-2019-0539 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0568 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0567 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0565 Microsoft Edge Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0547 Windows DHCP Client Remote Code Execution Vulnerability Critical No No 1 N/A RCE
CVE-2019-0550 Windows Hyper-V Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-0551 Windows Hyper-V Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-0564 ASP.NET Core Denial of Service Vulnerability Important No No 2 2 DoS
CVE-2019-0548 ASP.NET Core Denial of Service Vulnerability Important No No 2 2 EoP
CVE-2019-0566 Microsoft Edge Elevation of Privilege Vulnerability Important No No 1 N/A EoP
CVE-2019-0562 Microsoft SharePoint Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-0543 Microsoft Windows Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0555 Microsoft XmlDocument Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0552 Windows COM Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0571 Windows Data Sharing Service Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-0572 Windows Data Sharing Service Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0573 Windows Data Sharing Service Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0574 Windows Data Sharing Service Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0570 Windows Runtime Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-0545 ASP.NET Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0560 Microsoft Office Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0559 Microsoft Outlook Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0537 Microsoft Visual Studio Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0561 Microsoft Word Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0536 Windows Kernel Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0549 Windows Kernel Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0554 Windows Kernel Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0569 Windows Kernel Information Disclosure Vulnerability Important No No 1 1 Info
CVE-2019-0553 Windows Subsystem for Linux Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0541 Internet Explorer Remote Code Execution Vulnerability Important No No 1 1 RCE
CVE-2019-0538 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0575 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0576 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0577 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0578 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0580 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0581 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0582 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0583 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0584 Jet Database Engine Remote Code Execution Vulnerability Important No No 3 3 RCE
CVE-2019-0588 Microsoft Exchange Information Disclosure Vulnerability Important No No 2 2 RCE
CVE-2019-0586 Microsoft Exchange Memory Corruption Vulnerability Important No No 1 1 RCE
CVE-2019-0585 Microsoft Word Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0556 Microsoft Office SharePoint XSS Vulnerability Important No No 2 2 XSS
CVE-2019-0557 Microsoft Office SharePoint XSS Vulnerability Important No No 2 2 XSS
CVE-2019-0558 Microsoft Office SharePoint XSS Vulnerability Important No No 2 2 XSS
CVE-2019-0622 Skype for Android Elevation of Privilege Vulnerability Moderate No No N/A N/A EoP
CVE-2019-0546 Visual Studio Remote Code Execution Vulnerability Moderate No No 2 2 RCE

While there are only seven Critical-rated patches in the bunch, nearly half of this month’s patches correct some form of remote code execution. Eleven of these RCE patches involve the Jet Database Engine. One of these patches is listed as publicly known, but it’s not clear where the information is published. There is user interaction here, as targets need to open a specially crafted file. The Jet Database Engine is something we have a bit of familiarity with, so it’s good to see additional patches for the component.

User interaction is also what lowers severity ratings for RCEs in Office and, unusually, Internet Explorer. While browser bugs are typically browse-and-own, CVE-2019-0541 requires the target to edit a specially crafted file designed to exploit the vulnerability. There’s also patches for more traditional browser bugs in Edge and ChakraCore, but fewer this month than seen in previous months.

In addition to the Exchange bug mentioned above, there’s also an info disclosure bug in Exchange being addressed. This joins info disclosure bugs in other Office components, the Windows kernel, .NET, and the Windows Subsystem for Linux. Most of these will simply leak memory address information, but others could allow attackers to read data from files or details from calendar appointments. The ASP.NET component also has a couple of denial-of-service bugs patched this month. In both cases, a remote unauthenticated attacker could crash an ASP.NET Core web application by sending specially crafted requests.

Rounding out this month’s release are some elevation of privilege bugs in SharePoint and multiple Windows components, most notably the Windows Data Sharing Service, which gets four separate CVEs. For these types of bugs, attackers first need to log on to a system. They would then execute a specially crafted program designed to take advantage of the vulnerability. This is a common tactic for malware to embed itself on a system. SharePoint also gets three patches to address cross-site scripting (XSS) bugs, which also serve as a reminder to developers to always sanitize user input. 

The first advisory released in January is the confusingly named ADV990001, which provides the latest servicing stack updates for supported Windows versions. Although listed as Critical, this usage means that it is a critical update for your system – not a Critical severity bug. Finally, the other advisory for this month is Microsoft’s version of the previously discussed Adobe patch for Flash in Internet Explorer.

Looking Ahead

The next patch Tuesday falls on February 12, and we’ll return with details and patch analysis then. Until then, happy patching and may all your reboots be smooth and clean!


Newsbewertung

Weiterlesen

Hilflos gegen Angriffe aus dem Kinderzimmer

Hacking vom 08.01.2019 um 18:26 Uhr | Quelle google.com
Es scheint wie eine großangelegte Hacker-Attacke auf Politiker, Journalisten, Prominente. Inzwischen ist klar: Ein 20-Jähriger hat von seinem ...
Newsbewertung

Weiterlesen

http://ntsentencing.nt.gov.au/ph.hitachi.html

Hacking vom 08.01.2019 um 18:05 Uhr | Quelle zone-h.org
http://ntsentencing.nt.gov.au/ph.hitachi.html notified by PH.HITACHI
Newsbewertung

Weiterlesen

http://www.pnbpeo.go.th/hey.htm

Hacking vom 08.01.2019 um 17:06 Uhr | Quelle zone-h.org
http://www.pnbpeo.go.th/hey.htm notified by /MrAxxCT-
Newsbewertung

Weiterlesen

Politiker- und Promi-Hack: Seehofer will Frühwarnsystem etablieren

Hacking vom 08.01.2019 um 16:56 Uhr | Quelle google.com
Münch verwies dagegen etwa auf "Hacking-Methoden, um Passwörter zu überwinden". Der Täter habe es den Fahndern "nicht so schwer gemacht".
Newsbewertung

Weiterlesen

Zwischen Spaß und Verbrechen - Cybercrime als gesellschaftliches Phänomen und existenzielles ...

Hacking vom 08.01.2019 um 16:33 Uhr | Quelle google.com
Auch diejenigen, die Hacking sozusagen ‚freizeitmäßig' betreiben, sind in diesem Zusammenhang nicht zu vernachlässigen. Zwar mögen diese ...
Newsbewertung

Weiterlesen

Daten-Leak: 20-jähriger Hacker geständig

Hacking vom 08.01.2019 um 16:17 Uhr | Quelle zdnet.de
Der Schüler wohnt noch bei seinen Eltern und hat Ausspähaktionen als alleiniger Täter gestanden. Als Motiv gibt er Verärgerung über Äußerungen von Politikern und Prominenten an. Die Ermittler sprechen von "einigen bereits geschlossenen Sicherheitslücken".
Newsbewertung

Weiterlesen

Minister Seehofer und BehördenChefs präsentieren Details zum Datenklau So kamen die Ermittler ...

Hacking vom 08.01.2019 um 16:12 Uhr | Quelle google.com
Es ist eine der spektakulärsten Hacker-Attacken in Deutschland der letzten Jahre: Ein 20-Jähriger aus Hessen hat gestanden und ist nach einer ...
Newsbewertung

Weiterlesen

Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack

Hacking vom 08.01.2019 um 16:00 Uhr | Quelle securityaffairs.co

The cryptocurrency exchange Coinbase suspended the trading of Ethereum Classic (ETC) after double-spend attacks worth $1.1 Million The cryptocurrency exchange Coinbase has suspended the trading of Ethereum Classic (ETC) after double-spend attacks that consist in spending digital coins twice.Ethereum Classic (ETC) is the original unforked Ethereum blockchain, the attacks resulted in the loss of $1.1 million […]

The post Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack appeared first on Security Affairs.


Newsbewertung

Weiterlesen

US-Initiative warnt Unternehmen vor Hacking durch China und andere Länder

Hacking vom 08.01.2019 um 15:37 Uhr | Quelle google.com
US-Initiative warnt Unternehmen vor Hacking durch China und andere ... In einer Broschüre werden die Methoden beschrieben, die Hacker zum ...
Newsbewertung

Weiterlesen

BKA-Chef Münch: Hacker hat es uns nicht schwer gemacht

Hacking vom 08.01.2019 um 14:41 Uhr | Quelle google.com
Der Hacker habe Spuren hinterlassen und es den Behörden dadurch nicht sonderlich schwer gemacht, sagte Münch am Dienstag in Berlin.
Newsbewertung

Weiterlesen

Hacker-Angriff: Wie schützen? Was tun?

Hacking vom 08.01.2019 um 14:18 Uhr | Quelle google.com
Seit Tagen ist das vorherrschende Thema in den Medien der stattgefundene Hacker-Angriff auf zahlreiche Politiker und Prominente. Auch Politiker ...
Newsbewertung

Weiterlesen

http://simpatda.inhukab.go.id/baca.txt

Hacking vom 08.01.2019 um 13:56 Uhr | Quelle zone-h.org
http://simpatda.inhukab.go.id/baca.txt notified by Panataran
Newsbewertung

Weiterlesen

http://pajak.inhukab.go.id/baca.txt

Hacking vom 08.01.2019 um 13:55 Uhr | Quelle zone-h.org
http://pajak.inhukab.go.id/baca.txt notified by Panataran
Newsbewertung

Weiterlesen

http://bapenda.inhukab.go.id/baca.txt

Hacking vom 08.01.2019 um 13:54 Uhr | Quelle zone-h.org
http://bapenda.inhukab.go.id/baca.txt notified by Panataran
Newsbewertung

Weiterlesen

SOCKS Proxy List - 01/09/2019 by Tisocks.net

Hacking vom 08.01.2019 um 13:41 Uhr | Quelle breachforums.com
SOCKS Proxy List by Tisocks.net
If you Need Socks5 , Please visit service and add fund via PM , BTC WMZ , WEX . Thanks all!!
Add fund : https://tisocks.net/addfund
Check socks5 Online here : https://checksocks5.com
LIVE | 207.180.233.152:50900 | 0.469 | SOCKS5 | Unknow | Unknow | tor-exit-node.scalaire.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50680 | 0.823 | SOCKS5 | Unknow | Unknow | Next Layer Telekommunikationsdienstleistungs- und | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50074 | 0.733 | SOCKS5 | West-Vlaanderen | 8000 | this-is-a-tor-exit-node.filepit.to | Belgium | Checked at https://tisocks.net
LIVE | 207.180.233.152:50616 | 0.877 | SOCKS5 | Unknow | Unknow | h-158-174-122-218.NA.cust.bahnhof.se | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50492 | 0.849 | SOCKS5 | Unknow | Unknow | this-is-a-tor-exit-node-hviv125.hviv.nl | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50984 | 0.566 | SOCKS5 | Unknow | Unknow | wiebe.tor-exit.calyxinstitute.org | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50751 | 0.501 | SOCKS5 | Unknow | Unknow | tor-exit.r3.dtr.is | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 132.148.13.46:4997 | 0.244 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
LIVE | 207.180.233.152:50187 | 0.693 | SOCKS5 | Unknow | Unknow | Next Layer Telekommunikationsdienstleistungs- und | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 132.148.13.46:1918 | 0.245 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
LIVE | 91.206.30.204:3128 | 0.486 | SOCKS5 | Kyyiv | 02091 | d976979.freehost.com.ua | Ukraine | Checked at https://tisocks.net
LIVE | 207.180.233.152:50301 | 0.497 | SOCKS5 | Unknow | Unknow | cowcat.relay.coldhak.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 192.169.198.104:4997 | 0.244 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
LIVE | 207.180.233.152:50018 | 0.918 | SOCKS5 | Unknow | Unknow | yawnbox.emeraldonion.org | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 132.148.13.47:4997 | 0.244 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
Newsbewertung

Weiterlesen

SOCKS Proxy List - 01/09/2019 by Tisocks.net

Hacking vom 08.01.2019 um 13:41 Uhr | Quelle breachforums.com
SOCKS Proxy List by Tisocks.net
If you Need Socks5 , Please visit service and add fund via PM , BTC WMZ , WEX . Thanks all!!
Add fund : https://tisocks.net/addfund
Check socks5 Online here : https://checksocks5.com
LIVE | 207.180.233.152:50900 | 0.469 | SOCKS5 | Unknow | Unknow | tor-exit-node.scalaire.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50680 | 0.823 | SOCKS5 | Unknow | Unknow | Next Layer Telekommunikationsdienstleistungs- und | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50074 | 0.733 | SOCKS5 | West-Vlaanderen | 8000 | this-is-a-tor-exit-node.filepit.to | Belgium | Checked at https://tisocks.net
LIVE | 207.180.233.152:50616 | 0.877 | SOCKS5 | Unknow | Unknow | h-158-174-122-218.NA.cust.bahnhof.se | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50492 | 0.849 | SOCKS5 | Unknow | Unknow | this-is-a-tor-exit-node-hviv125.hviv.nl | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50984 | 0.566 | SOCKS5 | Unknow | Unknow | wiebe.tor-exit.calyxinstitute.org | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 207.180.233.152:50751 | 0.501 | SOCKS5 | Unknow | Unknow | tor-exit.r3.dtr.is | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 132.148.13.46:4997 | 0.244 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
LIVE | 207.180.233.152:50187 | 0.693 | SOCKS5 | Unknow | Unknow | Next Layer Telekommunikationsdienstleistungs- und | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 132.148.13.46:1918 | 0.245 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
LIVE | 91.206.30.204:3128 | 0.486 | SOCKS5 | Kyyiv | 02091 | d976979.freehost.com.ua | Ukraine | Checked at https://tisocks.net
LIVE | 207.180.233.152:50301 | 0.497 | SOCKS5 | Unknow | Unknow | cowcat.relay.coldhak.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 192.169.198.104:4997 | 0.244 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
LIVE | 207.180.233.152:50018 | 0.918 | SOCKS5 | Unknow | Unknow | yawnbox.emeraldonion.org | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 132.148.13.47:4997 | 0.244 | SOCKS5 | Arizona | 85260 | ip-192-169-198-104.ip.secureserver.net | United States | Checked at https://tisocks.net
Newsbewertung

Weiterlesen

09-01-2019 | Socks 5 & 4

Hacking vom 08.01.2019 um 13:28 Uhr | Quelle breachforums.com
[CENTER][Shopsocks5.com] Service Socks5 Cheap
Payment Instantly Perfectmoney, Bitcoin, Wmtransfer, BTC-E ([URL="http://shopsocks5.com/"] Please click Buy Socks [/URL])
Check Socks Online http://shopsocks5.com/check/[/CENTER]






Live | 118.139.176.242:14619 | Singapore | Singapore | 00 | Unknown | Checked at http://shopsocks5.com
Live | 121.54.175.93:18692 | Hong Kong | Central District | 00 | Unknown | Checked at http://shopsocks5.com
Live | 174.70.241.7:24385 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 121.54.175.93:42473 | Hong Kong | Central District | 00 | Unknown | Checked at http://shopsocks5.com
Live | 184.178.172.18:15280 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 206.189.116.191:53126 | United States | Flushing | NY | 11371 | Checked at http://shopsocks5.com
Live | 72.217.158.195:54810 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 70.168.93.201:17009 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 88.255.185.216:9050 | Turkey | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 94.177.170.43:50103 | Italy | Arezzo | 16 | 52100 | Checked at http://shopsocks5.com
Live | 88.255.185.212:9050 | Turkey | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 81.196.94.69:9999 | Romania | Arad | 02 | Unknown | Checked at http://shopsocks5.com
Live | 174.138.6.73:3127 | United States | Los Angeles | CA | 90017 | Checked at http://shopsocks5.com
Live | 119.28.191.18:7070 | China | Beijing | 22 | Unknown | Checked at http://shopsocks5.com
Live | 98.181.99.197:10368 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 174.70.241.18:24404 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Newsbewertung

Weiterlesen

09-01-2019 | Socks 5 & 4

Hacking vom 08.01.2019 um 13:28 Uhr | Quelle breachforums.com
[CENTER][Shopsocks5.com] Service Socks5 Cheap
Payment Instantly Perfectmoney, Bitcoin, Wmtransfer, BTC-E ([URL="http://shopsocks5.com/"] Please click Buy Socks [/URL])
Check Socks Online http://shopsocks5.com/check/[/CENTER]






Live | 118.139.176.242:14619 | Singapore | Singapore | 00 | Unknown | Checked at http://shopsocks5.com
Live | 121.54.175.93:18692 | Hong Kong | Central District | 00 | Unknown | Checked at http://shopsocks5.com
Live | 174.70.241.7:24385 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 121.54.175.93:42473 | Hong Kong | Central District | 00 | Unknown | Checked at http://shopsocks5.com
Live | 184.178.172.18:15280 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 206.189.116.191:53126 | United States | Flushing | NY | 11371 | Checked at http://shopsocks5.com
Live | 72.217.158.195:54810 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 70.168.93.201:17009 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 88.255.185.216:9050 | Turkey | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 94.177.170.43:50103 | Italy | Arezzo | 16 | 52100 | Checked at http://shopsocks5.com
Live | 88.255.185.212:9050 | Turkey | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 81.196.94.69:9999 | Romania | Arad | 02 | Unknown | Checked at http://shopsocks5.com
Live | 174.138.6.73:3127 | United States | Los Angeles | CA | 90017 | Checked at http://shopsocks5.com
Live | 119.28.191.18:7070 | China | Beijing | 22 | Unknown | Checked at http://shopsocks5.com
Live | 98.181.99.197:10368 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Live | 174.70.241.18:24404 | United States | Unknown | Unknown | Unknown | Checked at http://shopsocks5.com
Newsbewertung

Weiterlesen

http://probation.sg.gov.lk

Hacking vom 08.01.2019 um 12:56 Uhr | Quelle zone-h.org
http://probation.sg.gov.lk notified by PYS404
Newsbewertung

Weiterlesen

Zerodium offers $2 Million for remote iOS jailbreaks, and much more

Hacking vom 08.01.2019 um 12:38 Uhr | Quelle securityaffairs.co

The zero-day broker Zerodium offers $2 million for remote iOS jailbreaks and $1 million for chat app exploits. Zerodium announced it is going to pay up to $2 million for remote iOS jailbreaks that don’t need any user interaction, Previous offers of the company for this kind of exploits was $1.5 million. The company also doubled the […]

The post Zerodium offers $2 Million for remote iOS jailbreaks, and much more appeared first on Security Affairs.


Newsbewertung

Weiterlesen

GitHub Announces Unlimited Private Repositories For Free Plan

Hacking vom 08.01.2019 um 12:26 Uhr | Quelle gbhackers.com
GitHub Free

GitHub, the code sharing platform announced two major updates for making it more accessible to developers in both GitHub Free and GitHub Enterprise plans. The platform has more than 23 million individual clients in excess of 1.5 million associations. Unlimited GitHub Free Private Repositories Now the Github free plan includes unlimited private repositories, previously the […]

The post GitHub Announces Unlimited Private Repositories For Free Plan appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

http://kpt.tapteng.go.id/images/page/1546943677.jpg

Hacking vom 08.01.2019 um 11:49 Uhr | Quelle zone-h.org
http://kpt.tapteng.go.id/images/page/1546943677.jpg notified by MR.5T1Y0
Newsbewertung

Weiterlesen

Nine 2019 Cybersecurity Predictions

Hacking vom 08.01.2019 um 10:10 Uhr | Quelle securityaffairs.co

Wondering about the state of global cybersecurity in 2019? Wonder no more with these nine cybersecurity predictions for where the new year will take us — and what it means for our digital properties, online lives and livelihoods. 1. Everybody Will Have to Choose Their Partners and Equipment More Carefully The Internet of Things is […]

The post Nine 2019 Cybersecurity Predictions appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Seitennavigation

Seite 10 von 748 Seiten (Bei Beitrag 315 - 350)
26.177x Beiträge in dieser Kategorie

Auf Seite 9 zurück | Nächste 11 Seite | Letzte Seite
[ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [10] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ]