• Ping Us
  • Our Team
  • About Us
Thursday, May 22, 2025
Digitalys Mag
  • Home
  • Cybersecurity
  • Technology
  • Events
    • All
    • Conferences
    • Pop Culture
    National Cyber Security Congress 2.0

    National Cyber Security Congress 2.0

    Ryujin’Con 0: Videos + Article

    Ryujin’Con 0: Videos + Article

    Banzai 2018: Video + Review

    Banzai 2018: Video + Review

    Comic Con Tunisia 2018

    Comic Con Tunisia 2018

    Calendrier culturel de l’été 2018 – updated

    Calendrier culturel de l’été 2018 – updated

    [Securiday 2018] End User Protection

    [Securiday 2018] End User Protection

    • Conferences
    • Pop Culture
  • Entertainment
    • All
    • Gaming
    • Manga/Anime/comics
    • Movies / Series
    Koei Tecmo Victim of  DataBreach

    Koei Tecmo Victim of DataBreach

    Détective Conan : les épisodes de l’histoire principale triées [part 1]

    Détective Conan : les épisodes de l’histoire principale triées [part 3]

    Epic Games Store down due to Free Grand Theft Auto V offer

    Epic Games Store down due to Free Grand Theft Auto V offer

    Steam Security Saga: 0-Days, patches and researchers debates

    Steam Security Saga: 0-Days, patches and researchers debates

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    • Manga/Anime/comics
    • Movies / Series
    • Gaming
  • LifeStyle
  • Funny
  • Vlogs
No Result
View All Result
Digitalys Mag
  • Home
  • Cybersecurity
  • Technology
  • Events
    • All
    • Conferences
    • Pop Culture
    National Cyber Security Congress 2.0

    National Cyber Security Congress 2.0

    Ryujin’Con 0: Videos + Article

    Ryujin’Con 0: Videos + Article

    Banzai 2018: Video + Review

    Banzai 2018: Video + Review

    Comic Con Tunisia 2018

    Comic Con Tunisia 2018

    Calendrier culturel de l’été 2018 – updated

    Calendrier culturel de l’été 2018 – updated

    [Securiday 2018] End User Protection

    [Securiday 2018] End User Protection

    • Conferences
    • Pop Culture
  • Entertainment
    • All
    • Gaming
    • Manga/Anime/comics
    • Movies / Series
    Koei Tecmo Victim of  DataBreach

    Koei Tecmo Victim of DataBreach

    Détective Conan : les épisodes de l’histoire principale triées [part 1]

    Détective Conan : les épisodes de l’histoire principale triées [part 3]

    Epic Games Store down due to Free Grand Theft Auto V offer

    Epic Games Store down due to Free Grand Theft Auto V offer

    Steam Security Saga: 0-Days, patches and researchers debates

    Steam Security Saga: 0-Days, patches and researchers debates

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    • Manga/Anime/comics
    • Movies / Series
    • Gaming
  • LifeStyle
  • Funny
  • Vlogs
No Result
View All Result
Digitalys Mag
No Result
View All Result

50k printers hijacked to promote PewDiePie’s Youtube channel

Alyssa Berriche by Alyssa Berriche
20 July 2019
50k printers hijacked to promote PewDiePie’s Youtube channel
275
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

The TheHackerGiraffe used an open-source hacking tool, called Printer Exploitation Toolkit (PRET) to compromise 50,000 vulnerable printers worldwide to print out messages promoting the subscription to the PewDiePie YouTube channel from his fear that PewDiePie won’t remain the number one most-subscribed YouTuber.

 

This toolkit has been designed by researchers from Ruhr-Universität Bochum in Germany for testing printers against various known vulnerabilities, allowing attackers to capture or manipulate print jobs.

How did the hacker find these vulnerable devices?

He used Shodan, search engine for Internet-connected devices, to discover the list of vulnerable printers with port 9100 open.

This is just a reminder that every device in your organization that is exposed online enlarges your attack surface.

Tags: Cyber Securityhackinfosecmemepiediepiesecurityvulnerableyoutube
Share3TweetShareScan
Previous Post

TGTV new speedtest led to a surprise

Next Post

Ryujin'Con 0: Videos + Article

Alyssa Berriche

Alyssa Berriche

Cyber Threat Analyst & Security researcher. Founder and Technical Writer for DigitaLys-Mag

Related Posts

Koei Tecmo Victim of  DataBreach
Cybersecurity

Koei Tecmo Victim of DataBreach

5 January 2021
Cybersecurity

[Vulnerability] Zerologon – CVE-2020-1472 exploited in the wild

8 October 2020
National Cyber Security Congress 2.0
Conferences

National Cyber Security Congress 2.0

26 January 2020
Next Post
Ryujin’Con 0: Videos + Article

Ryujin'Con 0: Videos + Article

Social Networks

  • 418 Fans
  • 141 Followers

Random Quote

I once had a thousand desires. But in my one desire to know you all else melted away

— RUMI

Instagram

Follow-us on Instagram
Facebook Twitter Instagram Youtube
logo-digi

  • 344
  • 656
  • 3,024
  • 10,854
  • 112,153
  • 616,890
20160424 103856
IMG 0844
4
f2
20170708 174018
2016-05-29 14h59 45
20170708 174326
IMG 1170
20180920 100504
20170708 162645
20160821 125909
20180707 175936

© 2019 Digitalys Mag - Personal Blog & Magazine.

No Result
View All Result
  • Home
  • Cybersecurity
  • Technology
  • Events
    • Conferences
    • Pop Culture
  • Entertainment
    • Manga/Anime/comics
    • Movies / Series
    • Gaming
  • LifeStyle
  • Funny
  • Vlogs

© 2019 Digitalys Mag - Personal Blog & Magazine.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In