24.5.20

How to recover your Hacked Facebook Page

It's been a long time but I'm back now. In recent years, I got so many requests from people who wanted to recover their hacked Facebook pages. The main problem is there are too many incidents of this type (maybe millions per month), so the response time until someone from the Facebook staff replies can be long. After all, I decided to write a tutorial about how to do that in less than 48-72 hours.

Important to mention is that if you don't have the Facebook page verified with Blue Badge, it is very hard to prove who is the real Page Owner because it can be administrated by any valid Facebook profile (this is the reason that doesn't exist the feature to recover a Facebook page).

Share on:

7.4.17

9.5.16

Interview | NBC News USA

In a recent meeting with Ms. Cynthia McFadden, who was in Romania for an interview, we delved into my past, addressing an increasingly concerning theme in the digital world - 'ransomware.' Jointly with Mr. Madalin Dumitru, we discussed this pressing issue in an interview for NBC. I encourage you to watch our discussion to gain insights into the escalating cyber threats.



Share on:

27.1.16

Atlassian Jira | DOM XSS Vulnerability | Unauthenticated

Atlassian Jira is a widely-used project management platform, offering robust tools for tracking, managing, and collaborating on various projects. Its features, including issue tracking and customizable workflows, make it a staple in software development and project management.

DOM XSS (Cross-Site Scripting) is a medium-critical vulnerability specific to web applications. This attack allows malicious scripts to be injected directly into a web page's Document Object Model (DOM), putting users at risk. Prompt identification and remediation of this vulnerability are essential to safeguarding a web application's integrity and security.
Share on:

7.1.16

The most notorious hackers in internet history

I strongly believe that "Top 10 the most..." lists in hacking are unreliable. Non-industry experts typically create these rankings and rely on speculations. Journalists amplify these rankings but often lack a full understanding of the subject, leading to exaggerated importance assigned to certain persons. This can be extremely misleading, particularly for those unfamiliar with the intricacies of hacking.
Share on:

25.9.15

Auditing United Airlines | Bug Bounty Program

A few months ago, United Airlines launched a Bug Bounty program with a slightly different twist compared to the usual ones. Instead of rewarding participants with a sum of money, they opted to offer miles that can be used for flights or other perks such as car rentals, hotel stays, or merchandise with both their airline and those within the Star Alliance. Rewards range from 50,000 to 250,000 up to 1,000,000 miles, operating essentially as loyalty points. For instance, a flight from Bucharest to Dublin costs around 30,000 miles.
Share on:

17.6.15

The Most Dangerous Town | On the Internet

"IN SEARCH OF THE MOST DANGEROUS TOWN ON THE INTERNET" is a documentary film that dives deep into the secret world of hacking. It is a bold and artful look at the places and people that are fighting for and against the advancement of cybercrime.
Share on: