id
stringlengths
3
10
content
stringlengths
2
25k
6633_71975
The international live-fire cyber defence exercise Locked Shields 2018 took place on April 23-26 in Tallinn, Estonia, and the figures behind this important competition are impressive., A total of 22 Blue Teams participated in the Locked Shields 2018 exercise, more than 1,000 experts from nearly 30 countries have tested...
6306_68853
The iBoot is the component loaded in the early stages of the boot sequence and it is tasked with loading the kernel, it is stored in a boot ROM chip., “This is the first step in the chain of trust where each step ensures that the next is signed by Apple.” states Apple describing the iBoot., The leaked code is related t...
3192_43150
The Ukrainian Government is suffering a series of power outages in the Western region of the country likely caused by cyber attacks., The Ukrainian Government believes that the power outages are caused by operations conducted by Russian nation-state actors., “hacker attacks by Russian special services”., According to t...
7401_77888
Cryptocurrency malware continues to be a privileged choice for crooks and the number of victims is rapidly growing., Cryptocurrency miners are easy to detect due to the saturation of resources on the affected systems, but experts from Trend Micro spotted a new miner that leverages a rootkit component to hide its presen...
1159_24318
The New York time published the news that an FBI informant, Hector Xavier Monsegur, coordinated in 2012 a campaign of hundreds of cyberattacks on foreign websites. In many cases we discussed the possibility to exploit hacktivism to support military operations against a foreign government, the US intelligence was accuse...
822_19477
Mobile devices are reason of great concern for governments, they have a great computational capability, huge memories to store our personal data, GPS to follow our movements and are equipped with a camera and microphone to increase our experience in mobility. But all those features could be exploited by attackers for c...
2679_39567
Avid Life Media, the company that owns the Ashley Madison is offering a $500,000 reward for information that could allow law enforcement to identify and arrest the hackers behind the recent data breach it suffered., The company is hunting the resposibles, it has hired a number of investigators and forensic experts to i...
4759_55462
A new Apple’s iOS bug was discovered in the community of mobile tech experts, it can be exploited to crash iPhone or iPad devices by just sending an Emoji text message., Several users are already reporting the issue and the popular YouTube EverythingApplePro published a video proof-of-concept for the bug. In the video ...
650_15759
Mobile botnets are malicious infrastructures that are increasing with impressive trend especially the Android botnets, considering the capillary diffusion for the Google mobile OS. Android devices are in the hands of more than half mobile users and unfortunately bad habits and lack of awareness of cyber threats are cre...
5250_59348
“A total of 58 such attacks were reported by ten countries, up from 15 attacks during 2015.  ‘Black Box’ is the connection of an unauthorised device which sends dispense commands directly to the ATM cash dispenser in order to ‘cash-out’ the ATM.  Related losses were down 39%, from €0.74 million to €0.45 million.”, The ...
5248_59331
In the last days, security experts discovered numerous attacks that have been leveraging the same EternalBlue exploit used by the notorious WannaCry ransomware., The Shadow Brokers hacker group revealed the exploit for the SMB vulnerability in April, but according to malware researchers, other threats used it such as t...
1249_25519
“The flaw is in read_server_hello() / _gnutls_read_server_hello(), where session_id_len is checked to not exceed incoming packet size, but not checked to ensure it does not exceed maximum session id length.”, Pierluigi Paganini, (Security Affairs –  GnuTLS, encryption)
4792_55727
The security expert and bug hunter Craig Arendt (@craig_arendt) has discovered flaws in major eBook readers including the ones commercialized by Amazon, Apple, and Google., The expert discovered different XML external entity (XXE) vulnerabilities in the online epub ebook services that use leverages the ‘EpubCheck’ libr...
220_5609
Exactly on week ago a group of Iranian hackers named Cyber Warriors Team claimed to have compromised an SSL certificate issued to the Research and Education Support Services of NASA.  The press released by the Cyber Warriors Team said that hackers have written an HTTPS protocol scanner to find weaknesses in the NASA we...
1255_25587
Do you have exposed your Industrial control system (ICS) on the Internet?, “If ICS is connected to the Internet, it comes with an almost 100% guarantee of its being hacked on the first day” E. Kaspersky, I used the reply of the Founder of security firm Kaspersky Lab to give you an idea of the concrete risks for the num...
236_6167
It’s not a secret, Israel military is one of the most advanced and active cyber army that is using cyber-warfare to attack its enemy in the cyber space. For years Israel conducts cyber espionage and cyber offensive operations that allow the state to operate undisturbed, away from media pressure always attentive to the ...
5736_63370
The best news of the week with Security Affairs., Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter)
4740_55320
Is the popular messaging service Whatsapp affected by a backdoor? According to a blog post published by The Guardian, the application was affected by a vulnerability that could be exploited by attackers to intercept and read messages., The issue could not be considered as a backdoor either a vulnerability, it is an iss...
1068_23005
The security community is threatened by a new botnet composed at least 162,000 WordPress-powered websites abused to run DDoS attacks. The technique of attack allows to flood a target with requests sent by WordPress servers that received a specifically crafted spoofed Web request. The requests sent to the WordPress serv...
2180_35976
Turkish hackers have taken down the Vatican City official website for revenge against the recent statements by Pope Francesco on the Armenian genocide. The hacking group named Herakles (@THTHerakles) announced that he will continue the offensive against the Vatican City website until the Pope will not apologize officia...
5720_63203
The team of researchers at the Ben-Gurion University of the Negev in Israel composed of Mordechai Guri, Dima Bykhovsky‏, Yuval Elovici developed a PoC malware that leverages security cameras with Infrared capabilities to steal data., The security cameras are used as a covert channel for data exfiltration and to send co...
915_20810
Security experts have observed during last months an increase in the use of AutoIt coding language To Spread Malware and Toolsets. AutoIt is a very flexible scripting language used since 1999 in Windows environments. The language was used to perform simple operations like text file editing but allows also the creation ...
4871_56312
According to the threat intelligence firm Recorded Future, a Russian-speaking black hat hacker, known as ‘Rasputin‘, hacked systems of more than 60 universities and U.S. Government agencies., , We met Rasputin in December 2016, when he was offering for sale stolen login credentials for a U.S. agency that tests and cert...
2741_39982
According to the security firm Check Point a vulnerability in the popular messaging service WhatsApp Web exposes up to 200 million of its users at risk of cyber attack., WhatsApp Web allows the users of the popular mobile app to access their messages from desktop machines., An attacker can exploit the flaw in WhatsApp ...
5722_63230
According to security firm FireEye, a cyber espionage group linked to the Iranian Government, dubbed APT33, has been targeting aerospace and energy organizations in the United States, Saudi Arabia, and South Korea., The APT33 group has been around since at least 2013, since mid-2016, the group targeted the aviation ind...
2606_39089
Early 2015, part of the source code for the 2.0 version of the RIG exploit kit was leaked online due to a dispute between the main developer and a reseller. According to the researchers at Trustwave, the developer has recently released a 3.0 version of the RIG exploit kit which includes some significant improvements to...
1563_29384
Which is the cost of cybercrime suffered by US companies? The fifth annual report published by the Ponemon Institute and titled “2014 Global Report on the Cost of Cyber Crime” reveals that cyber attacks against large US companies (the Ponemon Institute focused on companies having more that 1,000 employees) result in an...
4837_56071
A new study confirms that dozens of iOS apps are affected by vulnerabilities that could be exploited by hackers to run man-in-the-middle (MitM) and intercept data from connections even if protected by TLS., The study was conducted by the developers at verify.ly, a service that analyzes iOS apps searching for security i...
2767_40151
A few weeks ago, CISCO issued an alert to warn enterprise customers about a spike in attacks in which hackers use valid admin credentials on IOS devices to install bogus ROMMON images, which is the bootstrap program that initializes the CISCO hardware and boot the software., Now security experts at Mandiant confirmed t...
1461_28222
A database containing 5 million alleged Google login and password has been leaked online on a Russian cyber security internet forum. The news was spread by online media agencies, including RT.com. The huge archive is in text file format and includes credentials for alleged compromised Google accounts, the database was ...
5997_66033
A mystery surrounds the recent hack of CoinPouch wallet app, users lost over $655,000 worth of Verge cryptocurrency., On Tuesday, the maintainers of the CoinPouch multi-currency wallet app  published a statement that disclosed a security breach that affected its users who stored Verge currency in their wallets., The pr...
5323_59939
According to a report published by American Security Today, the DARPA High-Assurance Cyber Military Systems (HACMS) program is designing technology for the creation of safe and secure cyber-physical systems., DARPA is currently developing a multifactor authentication system that aims to replace the current common acces...
4279_51536
Yahoo is ready to confirm a massive data breach that affected its service that has exposed several hundred million user accounts., “Yahoo is poised to confirm a massive data breach of its service, according to several sources close to the situation, hacking that has exposed several hundred million user accounts.” repor...
6520_70989
A new data breach made the headlines, the victim is Saks Fifth Avenue and Lord & Taylor stores. According to the parent company Hudson’s Bay Company (HBC), the security breach exposed customer payment card data, customer payment card data at certain Saks Fifth Avenue, the discount store brand Saks Off 5TH and Lord & Ta...
3490_45305
It might seem far-fetched, it looks like the hacker Craig Smith was able to design a malicious code that could infect computers used in the mechanic’s workworkshop, and these machines can later start infecting other vehicles that are going for service., Craig Smith is the founder of the Open Garages, a Vehicle Research...
1006_22121
A new strain of Point-of-Sale malware named “JackPOS” was discovered by IntelCrawler, a cyber intelligence firm from Los Angeles, confirming the growing trend of Point-of-Sales malware after the Target data breach. JackPOS was detected several days ago and it seemed based on code from “Alina”., “The bad actors are usin...
4047_49705
In June, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS).  CrowdStrike’s incident response time discovered not one, but two hacking groups that it considers “some of the best adversaries out of the all the numerous nation-state” groups the company encounters ...
7534_78955
Siemens has fixed several flaws in SINUMERIK controllers, some of them have been classified as “critical.” The list of vulnerabilities includes DoS, privilege escalation and code execution flaws., Security experts at Kaspersky Lab discovered that SINUMERIK 808D, 828D and 840D controllers are affected by multiple vulner...
3328_44123
Bad news for Android users, according to the security Doctor Web firm dozens of game apps in the Google Play Store have been infected with the Android.Xiny.19.origin Trojan. The malware could allow attackers to control the victim’s mobile device, by installing and running any kind of software (apk files), it also allow...
5537_61587
Three security researchers have discovered security vulnerabilities in the telematics control unit (TCU) manufactured by Continental AG that is installed on various car models manufactured by BMW, Ford, Infiniti, and Nissan., The researchers are Mickey Shkatov, Jesse Michael, and Oleksandr Bazhaniuk (@jessemichael, @Ha...
859_20092
Security experts at FireEye have discovered a new zero-day, a privilege escalation vulnerability in Windows XP and Windows Server 2003., Microsoft has issued a security advisory (2914486) informing the customers that Windows Kernel could allow elevation of privilege to attackers due the exploit of a bug in Windows XP’s...
7278_77047
This week, Juniper Networks has patched dozens of serious security provided security patches for each of them, the security advisories are available on the company website., The most severe flaw is probably the  CVE-2018-0049, which could be exploited by an attacker to crash the Junos kernel by sending specially crafte...
6546_71203
Ripple (XRP) and Verge (XVG) are two cryptocurrencies that attracted many investors in the last months., Last week attackers hackers the Verge cryptocurrency system by exploiting a vulnerability in its software and forced its developers to hard-fork the currency., The bug in the cryptocurrency scheme allowed the attack...
1589_29703
Sony Xperia Devices secretly send user data to servers in China, this is the last news that is shocking the mobile industry and that was published on several forums. The problem relates to Sony devices running the Android 4.4.2 or 4.4.4 KitKat version, it seems that the anomalous behavior is observable even if the user...
4496_53403
violation of the country’s data protection laws., On Thursday, a Moscow court has confirmed the decision to ban the professional social network LinkedIn in Russia. LinkedIn is violating the country’s data protection laws that ask foreign and Russian companies to store personal data of Russian users within the country’s...
7034_75222
What is a DNS leaks?, In this context, with the term “DNS leak” we indicate an unencrypted DNS query sent by your system OUTSIDE the established VPN tunnel., Kaspersky VPN is one of the most trusted VPN which comes with 1,000,000+ tier downloads in the official Google Play Store, however, it was observed that when it c...
1572_29511
Early this week,  Microsoft issued the security advisory 3010060 to warn its customer of a new Zero-Day vulnerability that affects all supported versions of Windows OS except, Windows Server 2003., The OLE Packager is the component that is affected by the zero-day, which was discovered by researchers at McAfee and Goog...
3455_45052
The BBC reported that two major high street banks will adopt new security measures to protect their customers. The decision to modify the security procedures follows the scoop made by two journalists from BBC Radio 4’s You and Yours programme that broke into an account online and removed money., Cybercriminals are incr...
3149_42867
An “unauthorized code” was discovered in the operating system for Juniper NetScreen firewalls. The company admitted the presence of the “unauthorized code” that could allow an attacker to decrypt VPN traffic., “unauthorized code” “could allow a knowledgeable attacker to gain administrative access to NetScreen devices a...
6035_66370
The German Government is preparing a law that will force hardware vendors to include a backdoor in their products. The law aims to allow law enforcement agencies to use backdoors to gather information during their investigations., The law would target devices in any industry, including telecommunications, automotive an...
954_21360
During the S4x14 Conference in Miami, Luigi Auriemma of ReVuln disclosed a serious vulnerability in HMI software. The team of researchers at ReVuln discovered a buffer overflow vulnerability in the company’s IntegraXor Web-based HMI software, a software designed by the Malaysian SCADA company Ecava., IntegraXor is a su...
206_5223
Private companies and governments agencies all around the word make huge investments for the automation of their processes and in the management of the electronic documentation., The main requirement in the management of digital documentation is its equivalence, from a legal perspective, to paperwork, affixing a signat...
3266_43665
Cyber defence industry is making money. In 2015, the market will reach 75 billion and in 2020 it will grow to around 170 billion. For some countries like the US, Israel, India and Europe, the cyber industry is vital to their economy., But, while the industry makes money, it doesn’t solve the problems. If you don’t beli...
435_11274
Everywhere is possible to read rivers of words on the impressive diffusion of social networks and mobile devices, both technologies used in the last months as privileged channels of attacks due their large audience., We all know how much dangerous are botnets and how many malicious purposes could be achieved with their...
3638_46523
The authors of the TeslaCrypt ransomware have introduced a couple of significant improvements, the new variant Version 4.1 has been in circulation for about a week. According to the experts at Endgame Inc., VXers have invested heavily in obfuscation and evasion techniques, and the malicious code can also encrypt new fi...
7609_79700
Kaspersky was a long accused to support Russian intelligence in cyber espionage activities and for this reason, its products have been banned by the US Government and EU Parliament., The company denied any involvement with operations conducted by the Russian intelligence and recently opened it Transparency Center in Zu...
4917_56686
Electronic health record databases are becoming the most precious commodities in the cyber criminal underground., The healthcare sector has been the industry with the highest number of data breaches in 2015 when a total of 113.2 million healthcare-related records were stolen by hackers., Cybercriminals are exploiting t...
6384_69612
The latest chaos in the digital world regarding Apple has stricken like a bullet, as the iPhone manufacturer announced to relocating the encryption key for users data in China; from the United States of America to some country in Asia!, Well, some security advocates argue that this is incorrect for the corporation itse...
6474_70561
The Meltdown and Spectre attacks could be exploited by attackers to bypass memory isolation mechanisms and access target sensitive data., The Meltdown attack could allow attackers to read the entire physical memory of the target machines stealing credentials, personal information, and more., The Meltdown exploits the s...
2304_36922
For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the study was collected from 144 countries and 19000 people were surveyed., “To help consumers spot these popular ph...
5087_57961
According to the experts at the security firm Wordfence tens of thousands, of home routers have been hacked and used to power cyber attacks on WordPress websites., The security firm observed a spike in the number of attacks originated from Algeria and that targeted customer websites. Further investigation revealed that...
2667_39472
According to the experts at Kaspersky security firm, an ATP group dubbed Blue Termite has been active since at least November 2013 focusing its attacks on Japanese organizations. The Blue Termite APT crew hit also other organizations worldwide, but most of its control infrastructure (C&C servers) are located in Japan.,...
5184_58799
There’s a new botnet in town and it’s named after the spy with a license to kill – James Bond. The new Bondnet botnet “Bond007.01” was discovered coming out of China by researchers at Guardicore Labs and it has infected an estimated 15,000 Windows server computers worldwide. The infected systems make up a wide variety ...
1672_30552
Adobe has released an emergency patch to patch a critical remote code-execution vulnerability (CVE-2104-8439) affecting Flash Player that was already fixed last month (Adobe’s Oct. 14th), but that was exploited again. According to an Adobe Security Bulletin, the update implements a mitigating solution for the CVE-2104-...
3077_42372
No Doubts, cyber criminals are jackals always ready to exploit any event in the headlines, even the most dramatic incidents. We have assisted in the past many cases in which crooks exploited the media attention on news events, such as the mysterious skyjacking of the Malaysian Airlines flight MH370 or the incident occu...
5599_62096
The most severe vulnerability patched by Drupal 8.3.7 is a critical issue, tracked as CVE-2017-6925 that affects the entity access system. The CVE-2017-6925 flaw can be exploited by an attacker to view, create, delete or update entities., The flaw impacts only entities that don’t have UUIDs and ones that have different...
7239_76763
Malware researchers at Cybaze ZLab analyzed the latest version of the infamous GandCrab ransomware, version 5.0. Most of the infections have been observed in central Europe, but experts found evidence that the malicious code doesn’t infect Russian users. GandCrab operates like a classic ransomware, it encrypts all user...
5723_63241
The malware compromised systems worldwide, most of them in Ukraine, the list of victims is long and includes the US pharmaceutical company Merck, the shipping giant Maersk, the Ukraine’s central bank, Russian oil giant Rosneft, advertising group WPP, TNT Express and the law firm DLA Piper., According to the second quar...
1921_33336
In 2014, the U.S. Defense Advance Research Projects Agency (DARPA) launched a the MEMEX project to design advanced search tools that could be also used to scan the deep web, which isn’t indexed by Google and other commercial search engines., The Memex  search engine was started to allow search of not indexed content, a...
514_12685
The year started very difficult for the U.S. government, its networks have been constantly hit by hackers that for different reasons have tried to steal sensitive information and intelligence secrets., The principal menaces against US come from state-sponsored hackers and hacktivists, in the last months we have read of...
4541_53777
A massive DDoS attack targeted the European Commission website, fortunately, according to an official statement from the organization the internal security team repelled the attack without damages., The experts from the European Commission confirmed that some servers hit by the DDoS attack went offline causing an outag...
5882_64948
The Dutch Information and Security Services Act will come into force in January 2018 and one of the main effects of the new legal framework is that country’s certificate authority, CA of the Staat de Nederlanden, could be taken off the Mozilla’s trust list., The new security laws specifically address metadata retention...
4401_52558
Yesterday a massive DDoS attack targeted the DNS service of the Dyn company, one of the most authoritative domain name system (DNS) provider, and caused an extended Internet outage. A large portion of Internet users was not able to reach most important web services, many websites like including Twitter, GitHub, PayPal,...
1286_25984
This week I had the pleasure and the honor to participate as a speaker for a seminar at Rome Security Summit 2014, the theme of the event was “Impact of Windows XP End of life on Critical Infrastructure”., The seminar was arranged by the AIIC (Association of Italian experts of Critical Infrastructure), a non-profit sci...
6782_73291
Adobe has released security updates for Flash Player that address four vulnerabilities, including a critical issue (CVE-2018-5002) that has been exploited in targeted attacks mainly aimed at entities in the Middle East., The CVE-2018-5002 vulnerability, reported by researchers at ICEBRG and Qihoo 360 and Tencent,  is a...
2350_37289
Gaana (Gaana.com), one of the most popular music streaming service in India has reportedly been hacked. Gaana service has more than 10 Million registered users and 7.5 Million monthly visitors, according to various sources available on the Internet, the hackers have had access to user information (including username, d...
2640_39306
On Saturday Carphone Warehouse (CW) was reportedly swamped by hackers than may have accessed personal and financial details of around 2.4 million customers according to the mobile retailer. The data breach affects customers who used OneStopPhoneShop.com, e2save.com and the Mobiles.co.uk websites. But it may not just st...
7698_80555
The State Bank of India that left a database containing personal information exposed online., The discovery was made by an anonymous security researcher that has found a server used for the bank’s Quick service, a mobile-based information service. Quick is “a free service from the Bank where in you can get your Accoun...
2645_39327
Recently I wrote a post on an Aerial Assault Drone recently presented at the Black Hat conference, the vehicle was equipped with hacking tools to compromise wi-fi target networks. The use of drones is increasing and the possible misuses too, the unmanned aerial vehicles could be used by groups of terrorists for reconna...
1898_33070
Wang Jing, a PhD student at the Nanyang Technological University in Singapore has discovered that the majority of the web page of About.com are vulnerable different types of attacks, including cross-site scripting (XSS) and iFrame injection (Cross Frame Scripting) ., Wang Jing has analyzed nearly 95,000 About.com links...
5538_61595
According to a new report from security provider Bitdefender, roughly 175,000 connected security cameras are vulnerable to cyber attacks., The vulnerable cameras are manufactured by the Chinese company Shenzhen Neo Electronics that offers surveillance and security solutions, including IP cameras, sensors and alarms., T...
1198_24923
According to a recent report titled “Operation Saffron Rose” published by cybersecurity company FireEye, a group called the Ajax Security Team is the principal Iranian hacking group, it is responsible for different espionage campaigns on custom-built malicious software., “This group, which has its roots in popular Iran...
5936_65444
The best news of the week with Security Affairs., Once again thank you!,  , Pierluigi Paganini, (Security Affairs – Newsletter)
777_18517
HP and the Ponemon Institute have published The 2013 Cost of Cyber Crime Study, the fourth annual report that provides an estimation of the economic impact of cybercrime., “Information is a powerful weapon in an organization’s cybersecurity arsenal,”“Based on real-world experiences and in-depth interviews with more tha...
4165_50586
The data dump leaked online by ShadowBrokers is a treasure for security experts and hackers that are analyzing every tool it contains., Cisco and Fortinet have confirmed their network appliance are vulnerable to the exploits listed in the leaked dump., Recently security researchers tested the BENIGNCERTAIN tool include...
6661_72234
The hackers started using the exploits for the above vulnerabilities to compromise drupal installs, mostly cryptocurrency mining., It has been estimated that potentially over one million Drupal websites are vulnerable to cyber attacks exploiting the two flaws if the security patches are not installed., A week after the...
3567_45889
The last effort of the NIST Agency in the development of email security guidelines is dated 2007 when it published the  NIST SP 800-45, Version 2 – Guidelines on Electronic Mail Security., The new NIST guide is a document composed of 81 pages that aim to give recommendations and guidelines for enhancing trust in email....
1781_31719
According to a new Joint Intelligence Bulletin of the FBI and the Department of Homeland Security on the attack on Sony Pictures, the hackers that compromised the systems of the giant. The FBI an official FBI bulletin was obtained by The Intercept states that the GoP hacking team that breached Sony Pictures represents ...
7166_76179
Yuryevich Levashov (38), the botmaster of the dreaded Kelihos Botnet pleaded guilty this week to computer crime, fraud, conspiracy and identity theft charges., In April 2017, the United States Department of Justice announced that Peter Yuryevich Levashov (36) (also known as Petr Levashov, Peter Severa, Petr Severa and ...
353_8926
 , Day by day we read about the discovery of new cyber threats that menace the integrity of user’s machines, a multitude of agents developed by cybercriminals or by state-sponsored researchers that operate stealing sensible information and in many cases destroying  targets., Every machine that is connected to internet ...
2503_38397
When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe., Tor network is free and it is the safest way to be anonymous since it hides your original IP from the destination server, to do tha...
5189_58850
The best news of the week with Security Affairs., First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.I desire to inform you that Security A...
3582_46031
Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access photos, sms, mms, emails, phone app, mailbox, phone settings or access to other default/installed mobile apps., The vulnerability ...
4244_51223
Israeli authorities have arrested two alleged operators of a DDoS service, named vDOS, as the result of an investigation conducted by the FBI., The popular security investigator Brian Krebs reported that the duo behind the vDOS booter service had earned more than $600,000 in the past two years. It has been estimated th...
3083_42416
Experts at FireEye have discovered an ongoing phishing campaign using a Dropbox account linked to “admin@338” as the delivery platform., The account ” admin@338 ” was also used in the past to deliver malware, but at the time the main target were financial, economic, and trade policy organizations. In March 2014, FireEy...
1402_27568
Two years ago Syria suffered a huge Internet blackout, the entire country was disconnected from the Internet for three days. Security experts attributed the responsibility for the Internet blackout to the Syrian government that is facing with an ongoing civil war., ,  , The Syrian Government denied to have disconnected...
163_3874
The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently announced a breach that exposed fewer than 1.5 million card accounts, held a conference call to discuss about the breach and its impacts. Again Krebson Security Blog is the more accredited...
5286_59639
Wikileaks released a new batch of documents belonging to the Vault7 archive related to the CIA project codenamed ‘Pandemic.’, RELEASE: CIA 'Pandemic' Windows infection malware documentation #Vault7 pic.twitter.com/HhmmvUBupi, — WikiLeaks (@wikileaks) June 1, 2017, , The Pandemic CIA project refers a Windows persistent...
4948_56901
A serious flaw in the popular work chat application Slack could be exploited to take over a user account., , The vulnerability was discovered by bug bounty hunter Frans Rosen who demonstrated that is possible to steal Slack access tokens to impersonate a user. The flaw resides in the way the Slack application communica...
7131_75921
Experts at security firm Group-IB have exposed the attacks committed by Silence cybercriminal group. While the gang had previously targeted Russian banks, Group-IB experts also have discovered evidence of the group’s activity in more than 25 countries worldwide., Group-IB has published its first detailed report “Silenc...