id
stringlengths
3
10
content
stringlengths
2
25k
1990_34215
Security firm Proofpoint revealed that its experts recently detected a spam campaign targeting organizations and primarily Brazilian Internet users. The spam campaign implements a very effective technique to spy on a victim’s Web traffic. The particularity of this attack resides in the kill chain that started with mali...
3576_45981
Details of almost 50 Million Turkish citizens have been leaked online, the bulk data was hosted on a server with the IP address 185.100.87.84. The archive was published during the weekend, the publishers claim they it belongs to 49,611,709 Turkish citizens, the complete 1.5GB archive (mernis.sql.tar.gz – 1.5GB compress...
5210_59031
The exploit code was published by ExploitBox, a remote attacker can chain the flaw with the Host Header injection vulnerability CVE-2016-10073 to execute arbitrary code and take the control of the affected software., , Vanilla Forums is the software mentioned by the popular security researcher Dawid Golunski in the fol...
4795_55750
A joint operation conducted by the Europol and the Asian law enforcement allowed to arrest five members of an international organised cybercrime gang focused on cyber attacks on ATMs, three of them have been convicted., It has been estimated that the group caused to the banks around EUR 3 million losses., One arrest ha...
5394_60507
The security expert Benjamin Kunz-Mejri from security firm Vulnerability Lab discovered a Skype zero-day stack buffer overflow vulnerability, tracked as CVE-2017-9948, that could be exploited by a remote attacker to execute malicious code., Vulnerability Lab reported the flaw to Microsoft on 16th May, Microsoft release...
6132_67227
Before Christmas, the Mirai botnet made the headlines once again, a new variant dubbed Satori was responsible for hundreds of thousands of attempts to exploit a recently discovered vulnerability in Huawei HG532 home routers., The activity of the Satori botnet has been observed over the past month by researchers from Ch...
5062_57757
Yesterday I wrote about SCADA systems that are currently shipped with an unchangeable hard-coded password, and today I’m here to discuss you a similar problem., The Mobility Express Software developed by the IT giant CISCO that is shipped with Aironet 1830 Series and 1850 Series access points has a hard-coded admin-lev...
2586_38950
Bitphone is a new VoIP service, a perfect tool to perform some social engineering calls, but why?, Bitphone is like a Payphone, the only difference is that in this case you need to pay it with bitcoins (it accepts around 40 types of bitcoins), what helps the anonymity part., To be able to use the service, there is no n...
2108_35396
The researchers Simone Bovi and Mauro Gentile at the security firm Minded Security discovered a flaw in the popular networking library for iOS and OS X AFNetworking. The researchers found the flaw while were conducting the analysis of a mobile application for one of their clients.were conducting the analysis of a mobil...
7741_80998
The 0patch experts released a micropatch to address a zero-day vulnerability in Adobe Reader which could be exploited by threat actors to craft maliciously PDF documents that call home and send over the victim’s NTLM hash to remote attackers in the form of an SMB request., The vulnerability was reported by the security...
1860_32665
Symantec experts estimated that the scammers have so far earned several thousand dollars via this particular campaign. It’s impossible to know, but it’s likely they are running other similar ones at the same time., To prevent computers from being compromised with click-fraud malware such as Trojan.Tubrosa, Symantec sug...
6101_66964
Security experts at pen-test firm Syss have discovered that the Windows 10 facial recognition security feature dubbed Hello can be spoofed in the simplest way, using a photo of an authorized user., “Microsoft face authentication in Windows 10 is an enterprise-grade identity verification mechanism that’s integrated into...
5816_64276
Don’t trust message apparently sent from any of your Facebook Friends asking for urgent help to recover their Facebook account., Researchers have spotted a new Facebook scam that could deceive also tech-savvy people and trick them into giving the attacker access to their Facebook accounts., The Facebook scam abuse “Tru...
2158_35816
The blue team of DARPA (Defense Advanced Research Projects Agency) backed up by Iowa State University researchers are developing a tool that will help with Android malware analysis., The features used by the blue team include “smells” which uses stronger heuristics to understand if exits any trace of malware.  Benjamin...
2218_36292
Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users., The Tor-Based Dark Web Email Service SIGAINT is one of the services under constant attack of Government agencies, recently its adminis...
787_18772
Arbor Networks has issued the report on global DDoS attack trends for the first three quarters of 2013, the report revealed that this kind of attack still represents a serious menace for IT security communities. The document provides an interesting overview into Internet traffic patterns and threat evolution. The data ...
7603_79628
The cryptocurrency exchange Coinbase has suspended the trading of Ethereum Classic (ETC) after double-spend attacks that consist in spending digital coins twice.Ethereum Classic (ETC) is the original unforked Ethereum blockchain, the attacks resulted in the loss of $1.1 million worth of the digital currency., 51% attac...
5257_59407
Qatar faced an unprecedented security breach, unknown attackers posted fake news stories attributed to its ruler on highly sensitive regional political issues., , The hackers hit the Qatar official news agency website and Twitter account in the early hours of the morning causing serious problem to the country., The gov...
6608_71740
After my last month’s finding in Hotspot Shield, I decided to look at and audit more VPNs to see how many of the major VPN vendors are vulnerable to information leakage. Together with File Descriptor, we decided to look at 3 random major VPN clients to see what we can find. Our research was supported by the privacy adv...
6450_70333
Most of the modern text editors allow users to extend their functionalities by using third-party plugins, in this way they are enlarging their attack surface., Third-party plugins could be affected by vulnerabilities that could be exploited by hackers to target our systems., The situation is particularly severe in case...
3458_45075
The Anonymous hacking collective continues its personal battle against Donald Trump, this time hacking the voicemail of the presidential candidate., On Thursday, Gawker received an anonymous email containing recordings from Donald Trump’s voicemail inbox. The recordings include messages left for Trump by various celebr...
1283_25939
Cybercrime is considered by governments an emergency to mitigate urgently, criminal activities are causing large losses to the global economy as reported in the recent report published by McAfee., The FBI created a new task force with the New York Police Department and the Metropolitan Transit Authority to respond to t...
7385_77771
The security expert Sergey Zelenyuk has disclosed the details of a zero-day vulnerability affecting Oracle’s VirtualBox virtualization software that could be exploited by an attacker to make a guest-to-host escape., Zelenyuk publicly disclosed the vulnerability without waiting for a patch from Oracle because of his “di...
545_13316
Botnet author are increasing complexity of the malicious code they use and at the same time security firms are adopting more sophisticated detection methods. Between principal concerns of botmaster the need to improve the capabilities of bot agents to operate silently and necessity to masquerade traffic from bots and C...
2030_34637
The FBI is investigating a series of cyber attacks occurred over the weekend on several western websites, the authorities suspect the involvement of hackers linked to the ISIS. The list of hacked websites includes the Dublin Rape Crisis Centre in Ireland, Eldora Speedway, MERS Goodwill and digital agency Elasticity fro...
4239_51181
,  , You are a talented hacker that is very active online, could you tell me more about you. Could you tell me which his your technical background and when you started hacking? , I started a few years ago when I realized that governments control everyone and I wanted to know what I could stop them. So, I wondered how I...
2280_36749
Edward Snowden has revealed how the US intelligence spy on communication worldwide, despite the market is offering solutions that promise to be “NSA-surveillance proof” the majority of people still use messaging apps like iMessage or Google Hangouts., The IT giants have always denied any involvement in the surveillance...
7637_79993
Unknown hackers compromised 10 PCs at ministry’s Defense Acquisition Program Administration which is the office that manages the military procurement. , The news was confirmed by the South Korea Ministry of National Defense., “It has been turned out that 30 computers installed on the internal system of the Defense Acqu...
4386_52432
1. Introduction, You have an iPhone 6S protected by a 6 digits password plus the touch ID fingerprint and you may think that nobody can unlock it without the code, right? Wrong! At least not, according to the incident we analyzed this week at Morphus Labs., An iPhone 6S, exactly as described in the previous paragraph, ...
7733_80904
Google has open sourced its fuzzing infrastructure ClusterFuzz that the tech giant developed to find memory corruption bugs in the Chrome browser., ClusterFuzz is a scalable fuzzing tool that can run on clusters with more than 25,000 cores. , The platform has been available as a free service to open source projects thr...
5772_63763
From the authors’ website, “Dnsmasq provides network infrastructure for small networks: DNS, DHCP, router advertisement and network boot.” In practice, the Dnsmasq code has been widely leveraged in routers, firewalls, IoT devices, virtualization frameworks and even mobile devices when you need to set up a portable hots...
1937_33511
Recently Pakistan customers of the Standard Chartered Bank have received transaction alerts via email and SMS that alerted them about alleged withdrawals of Rs.50, 000 ($500) cash from their bank accounts., The problem is that hackers stole money from their banking account without any action on their part. Some of the ...
2170_35910
At the end of 2014, security experts at Kaspersky Lab discovered a serious vulnerability in the Darwin kernel. The name “Darvin kernel” is unknown to the majority of the user, but represents an important component for their machines considering that it is an open source component of Apple OS X and iOS., Every Apple use...
5059_57731
Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new proof of concept ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controllers (PLCs). The ransomware a.k.a ClearEnergy affects a massive range of PLC mo...
4655_54672
It’s holiday time and hackers can transform this period in a nightmare for gamers. Two years ago Lizard Squad hackers took down the networks of Sony PSN and Microsoft XBox Live., Now the notorious Phantom Squad group has claimed responsibility for conducting a series of massive DDoS attacks against the online gaming pl...
7205_76499
The security researcher Sabri Haddouche from Wire discovered a bug that affects Firefox on Mac, Linux, and Windows that could crash the browser and in some cases the underlying PC., Haddouche was focusing its analysis on vulnerabilities that affect major browsers (Chrome, Safari (WebKit), and Firefox), he published his...
4413_52672
According to the Iraqi army, approximately 50 villages have been taken from the ISIS since last Monday, as the army prepares for the onslaught on Mosul, where 5,000 to 6,000 ISIS fighters are believed to remain. The international coalition battling to eradicate ISIS in Mosul is a disparate assembly, lacking true cohesi...
1085_23254
The Tor Browser is the most popular tool for anonymization of the user’s Internet experience, it’s use is literally exploded after the  disclosure of numerous documents leaked by Snowden of US surveillance programs. A growing number of internet users have started to use the popular browser to anonymize browsing session...
5708_63109
More details are emerging from the recent Equifax data breach that impacted approximately 143 million U.S. consumers. The attackers exploited the CVE-2017-5638 Apache Struts vulnerability that was fixed back in March, but the company did not update its systems, a thesis that was also reported by an Apache spokeswoman t...
176_4351
Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of attack, the same result. On internet bounced messages of joy for having staged the second act of the operation called b...
5620_62284
According to experts at FireEye, crooks are exploiting the Neptune exploit kit (aka Terror EK, Eris, and Blaze) to delivery cryptocurrency miners via malvertising campaigns. The Neptune exploit kit was first spotted in January and was initially classified as a variant of the Sundown exploit kit due to the several simil...
6517_70956
Facebook is under the fire after the revelation of the Cambridge Analytica case and its role in the alleged interference to the 2016 US presidential election., While the analysts are questioning about the interference with other events, including the Brexit vote, Facebook is now looking to prevent such kind of operatio...
6125_67162
Good news for PlayStation gamers, the developer SpecterDev finally released a fully-functional kernel exploit for PlayStation 4 (firmware 4.05) dubbed ‘namedobj’., PS4 gamers who are running firmware version lower than 4.05 need to update their gaming console to trigger the exploit., The Kernel exploit was released two...
7724_80801
Nicolas Merle from industrial cybersecurity firm Applied Risk discovered several flaws in a gateway produced by the Germany-based firm Kunbus, some of them could allow an attacker to gain full control of the vulnerable devices. Kunbus gateway solutions are used by several organizations worldwide.Merle discovered five v...
4388_52455
On 19 July at 11pm Ankara time, Wikileaks published the first emails that were grabbed from the Turkish AKP. The organization led by Julian Assange, being in line with its policy on publication of secret information, also released the content of the attachments spreading the malware contained in the emails., , However,...
6768_73176
Administrators of organizations using Google Groups and G Suite must review their configuration to avoid the leakage of internal information., Security researchers from Kenna Security have recently discovered that 31 percent of 9,600 organizations analyzed is leaking sensitive e-mail information., The list of affected ...
4314_51833
This summer 200 million Yahoo user accounts were offered for sale in a black market on the dark web., The company promptly started its investigation and last week confirmed the data breach, dated back at 2014 revealing that a nation-state actor has exposed at least 500 Million Yahoo user accounts., But, now it seems th...
4441_52911
The Chinese APT Lotus Blossom, also known as Elise and Esile, is behind a new cyber espionage campaign that is trying to lure victims with fake invitations to Palo Alto Networks’ upcoming Cybersecurity Summit., With this social engineering trick the attackers are trying to trick users into installing a strain of malwar...
7110_75782
 , Indeed if none of searched AV were found on the target system Stage1 was acting as a simple downloader. The specific performed actions follow:, Stage1 was dropping and executing a brand new PE file named: rEOuvWkRP.exe (sha256: 92f59c431fbf79bf23cff65d0c4787d0b9e223493edc51a4bbd3c88a5b30b05c) using the bitsadmin.exe...
7093_75683
A group of researchers from the University of Florida, Stony Brook University, and Samsung Research America, has conducted an interesting research on the set of AT commands that are currently supported on modern Android devices., The experts published a research paper titled “ATtention Spanned: Comprehensive Vulnerabil...
3760_47409
The popular white hat hacker Tavis Ormandy from the Google Project Zero has discovered a critical exploitable flaw (CVE-2016-2208) in the Symantec antivirus system. The expert discovered an exploitable memory overflow vulnerability in the core Symantec Antivirus Engine which is used in most Symantec and Norton solution...
2020_34527
A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, data related nearly 98,000 U.S. military personnel stationed in Europe may have been exposed., , Hackers acce...
3299_43917
Skype now hides users’ IP addresses, a measure implemented to protect them against attacks from online trolls., Skype announced the security feature this week in a blog post, the feature is enabled by default in the latest update provided by the company., Previously, it was quite easy to obtain the IP address of a Skyp...
2790_40325
Adobe has released a new Flash Player update that fixes 23 critical vulnerabilities in the popular software., According to the security bulletin issued by Adobe, Version 18.0.0.231 and earlier of the Flash Player for Windows and Mac, Microsoft Edge and Internet Explorer 11 in Windows 10, and Internet Explorer 10 and 11...
434_11256
CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting on large-scale the control systems inside utilities, including power grid and gas pipeline controllers, with the purpose to discover security vulnerabilities., The program was revealed by new document...
609_14703
A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed by American officials and private security experts., The attacks are classified as “potentially destructive” and targeted IT infrastructures of various sectors especially the energetic one, the expert has tracked them back to Ir...
1684_30663
On Saturday the collective of hackers behind the recent attack on the Sony Pictures Television, the GOP, leaked online sales and contract data stolen in the data breach. The corporate network of Sony Pictures was breached and taken offline exactly one week ago and now a 894MB archive containing thousands of files, cove...
381_9720
Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices in Italy. In that occasion I didn’t excluded offensives of the group of hacktivists against institutions of my country predicting them in conjunction with the upcoming elections or financial maneuvers., ...
2555_38729
Microsoft released an out-of-band patch to fix a critical security issue in the Windows Adobe Type Manager Library that could be exploited by attackers to execute arbitrary code remotely on the targeted machine., The exploitation of the flaw allows attackers gain complete control over the targeted system., “There are m...
7306_77201
A group of researchers from the Silesian University of Technology in Poland has discovered three vulnerabilities in some models of D-Link routers that could be chained to take full control over the devices., The flaws are a Directory Traversal (CVE-2018-10822), Password stored in plaintext (CVE-2018-10824), and a Shell...
6746_73009
The author of the Taylor cryptocurrency trading app announced a security breach, an unknown hacker has stolen around $1.35 million worth of Ether from the wallets of the company., The funds were collected by the company through an initial coin offering (ICO) round., The attack occurred on May 22. the company is still i...
5360_60248
Linux, BSD, Solaris and other open source systems are vulnerable to a local privilege escalation vulnerability known as Stack Clash that allows an attacker to execute code as root., Stack Clash is a local privilege escalation vulnerability tracked as CVE-2017-1000364 that affects some open source systems, including Lin...
6552_71261
Some of the most popular music videos on YouTube, including the world’s most popular YouTube video ‘Despacito’ has been hacked., Popular videos of  pop stars like Shakira, Drake, Selena Gomez, Adele, Taylor Swift, and Calvin Harris were replaced by hackers that spread the message “Free Palestine.”, Despacito, the Luis ...
4043_49678
A hacker has accessed and downloaded the source code of the Twitter’s Vine application. Vine is a short-form video sharing service, acquired by Twitter in 2012, that allows users to share small videos of 6 seconds looping them., The security expert and bug hunter Avinash has discovered a flaw in Vine that allowed him t...
238_6239
According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks on Incheon International Airport systems spreading a virus planted in game programs., The information has been provided by the Seoul Metropolitan Police Agency referring that a 39-year-old S...
4569_54029
While I was reporting the news that the FSB unnamed foreign hackers are planning to undermine Russian Banks, the Russian Central Bank confirmed hackers have stolen 2 billion rubles (roughly $31M) in cyber attacks, Central bank official Artyom Sychyov confirmed the incident and added that the hackers had attempted to st...
209_5337
In last months we have a long discussed about the security status of US networks and infrastructures, we have described the American cyber strategies and the main action proposed to protect the principal assets of the nations. One story in particular struck us deeply, that relating to the vulnerability of U.S. Governme...
6295_68753
Lauri Love was accused of hacking into United States government websites, will not be extradited to stand trial in the U.S., the High Court of England and Wales ruled today., The list of victims of the hacker includes the FBI, the Federal Reserve Bank, US Missile Defence Agency, National Aeronautics and Space Administr...
4113_50170
Claudio Caracciolo (@holesec)  wrote a book and is known for his effective interpersonal skills and his ability as an international speaker., Enjoy the Interview., , You are one of the world’s most talented cyber security experts, Could you tell me which his your technical background and when you started hacking?, Firs...
7156_76108
The responsible of the recently disclosed British Airways data breach is a crime gang tracked as MageCart. The group has been active since at least 2015 and compromised many e-commerce websites to steal payment card and other sensitive data., The group injects a skimmer script in the target websites to siphon payment c...
5512_61393
Chinese police have identified and arrested individuals suspected to be the operators behind the massive adware campaign that infected more than 250 Million computers across the world earlier this year., In June, researchers at security firm Check Point discovered the massive campaign spreading the Fireball malware. Th...
849_19934
The NSA infected more than 50000 networks worldwide with malicious software designed to steal sensitive information. The large-scale cyber espionage operation was revealed once again by documents provided by former NSA consultant Edward Snowden according to Dutch media outlet NRC., “The NSA declined to comment and refe...
4653_54659
Signal is considered the most secure instant messaging app, searching for it on the Internet it is possible to read the Edward Snowden’ testimony:, “Use anything by Open Whisper Systems” Snowden says., The Cryptographer and Professor at Johns Hopkins University Matt Green and the popular security expert Bruce Schneier ...
1633_30139
The use of off-the-shelf keyloggers/RATs like Predator Pain and Limitless doesn’t impact the illicit activities of criminal crews, in many cases, crooks prefer to invest more time and effort instead of using automated malware that results anyway more expensive., “The tools these fraudsters use are not advanced. Combine...
2172_35920
The Iranian Arabic-language state TV network Al Alam announced that its Twitter account had been hacked on Sunday., The attackers abused the account to spread a false report to post the news that an Iran-allied rebel leader in Yemen had died. The Al Alam TV aired numerous reports on the crisis in Yemen since Saudi Arab...
1580_29607
The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346). The Samsung FindMyMobile implements several features that allow users to locate the lost device, to play an alert on a remote device or to lock remotely the mobile phone., “The Remote Contro...
6129_67198
When you think of personal security questions, you might think of your mother’s surname or other family information that normally isn’t shared — unless you are building your family tree with an online genealogy search. When Ancestry.com notifies its users of a potential security breach it sounds worse than most., Ances...
6750_73042
The security breach suffered by the Bank of Montreal (BMO) may have impacted less than 50,000 of the overall 8 million customers, the incident suffered by Simplii Financial may have exposed information of 40,000 clients., “Two Canadian banks warned Monday they have been targeted by hackers, and that the personal inform...
2487_38259
Security researcher Benjamin Caudill has designed a device that allows to keep anonymous users online experience, an amazing system for the anonymity of whistleblowers, journalists and dissidents., Caudill named his device ProxyHam, it’s a “hardware proxy” that allows users to connect to anonymously connect to public W...
7411_77971
A BGP leak caused unavailability of Google service on Monday, the traffic was redirected through Russia, China, and Nigeria., At the time it is not clear if the incident was the result of an error or a cyber attack on the BGP protocol., It’s unclear if the incident was caused by a configuration issue or if it was the r...
2965_41646
While the investigation of the TalkTalk data breach is going on, a third man has been arrested in connection with the hack. A third unnamed suspect is a 20-year-old man from Staffordshire, he has been released on bail until March after he was arrested by law enforcement under the country’s Computer Misuse Act., Investi...
905_20705
NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a privileged target for hackers, in 2012 it suffered  2,500 “significant cases” of cyber attacks against its networks, during the 2013 the si...
782_18645
Today I decided to propose an interesting backdoor analysis published on the blog “/dev/ttyS0” specialized on the embedded device hacking., The researcher Craig demonstrated the presence of a backdoor within some DLink routers that allows an attacker to access the administration web interface of network devices without...
5040_57565
Attackers have targeted developers having Github repositories with a data-stealing malware called Dimnie. The malicious code includes keylogging features and modules that capture screenshots., The Dimnie malware was spotted by researchers at Palo Alto Networks in mid-January when an unknown number of developers were ta...
6056_66544
“On December 5, 2017 NIST published the second draft of the proposed update to the Framework for Improving Critical Infrastructure Cybersecurity (a.k.a., draft 2 of Cybersecurity Framework version 1.1).” states the NIST. “This second draft update aims to clarify, refine, and enhance the Cybersecurity Framework, amplify...
3813_47855
Many security experts believe that medical industry lack of a proper security posture, despite it is a high-tech sector the vast majority of medical equipment was not designed with a security by design approach. Another element to consider is that the healthcare industry is becoming a privileged target for cyber crimin...
6368_69457
Other precious commodities in the criminal underground are code-signing certificates, they allow vxers to sign the code for malware to evade detection. Operators of the major black markets in the darknets buy and sell code-signing certificates, but according to an interesting research conducted by threat intelligence f...
6962_74670
A few days ago, the security researcher Lukas Stefanko from ESET discovered an open repository containing some Android applications., ,  , The folder was found on a compromised website at the following URL:, hxxp://chatsecurelite.uk.to, This website is written in Arabic language and translating its content it seems to ...
1325_26545
The source code for Tinba banking trojan, aka Tinybanker, has been leaked in the cybercrime ecosystem, the malware is recognized as the smallest banking malicious code in the wild and it is available on an underground forum., The release of source code in the underground represents a significant milestone in the story ...
942_21165
Again Syrian Electronic Army, the popular group of Hackers this time hacked the Microsoft News Twitter account — @MSFTNews. The Syrian Electronic Army (SEA) has compromised early 2014 the Skype‘s Twitter account and blog to protest against the support provided to the NSA surveillance program., Microsoft has immediately...
4238_51177
Crooks are using Google Drive to host a new Facebook Hacker Tools that allows attackers to steal credentials from potential hackers who try to hack other users’ accounts on the Facebook social network., “When they deploy this CaaS service, it becomes very easy for users to conduct cyberattacks,” said BCECTL director Ad...
829_19623
The banking is one of the most targeted sector by cybercrime that exploit always new vector to infect a customer’s machine of the clients of banks., I decided to write this post to alert banks’ customers and to avoid large scale infection, the malicious campaign is started in Brazil where many clients of financial inst...
1967_33916
DDoS attacks are even more dangerous for every organization that exposes its resources and services on the Internet, recent attacks against Sony PSN network and XBox live service demonstrate it., DDoS attacks despite could cause serious damages to victims are quite easy and cheap to run, according to the latest Verisig...
3843_48085
Another day another data breach, this time 100 million login credentials belonging to the users of the Russian social networking platform VK.com (VKontakte) are available for sale. Some experts estimate that the number of hacked records could be higher, reaching 170 million accounts., VK.com is the Russian version of t...
6011_66172
Clarkson confirmed the  hackers may release some of the stolen data, it hasn’t provided further details due to the ongoing law enforcement investigation., The information disclosed by the company suggests cyber criminals blackmailed the company requesting the payment of a ransom in order to avoid having its data leaked...
5164_58620
Today the Malwarebytes malware researcher Adam Thomas has discovered found a variant of the OSX.Dok dropper works in a different way respect the first one and installs a different payload, dubbed Bella., “Adam Thomas, a Malwarebytes researcher, found a variant of the OSX.Dok dropper that behaves altogether differently ...
6972_74744
A new botnet, tracked as ‘Death botnet,’ has appeared in the threat landscape, its author that goes online with the moniker EliteLands is gathering unpatched AVTech devices in the malicious infrastructure., AVTech is one of the world’s leading CCTV manufacturers, it is the largest public-listed company in the Taiwan su...
3901_48561
Recently we have reported the first results of the “Hack the Pentagon” program that allowed the discovery of numerous flaws in the computers of the US Government. News of the day is that the high school student David Dworken from Washington DC has hacked into Pentagon computer systems. Dworken revealed to have spent 10...
5567_61837
Mamba ransomware is one of the first malware that encrypted hard drives rather than files that was detected in public attacks., Mamba leverages a disk-level encryption strategy instead of the conventional file-based one., A similar Ransomware, called Petya, made the headlines for the recent massive attack and its disk ...
6046_66451
He started a blog called: THE PURPLE HAT – Cyber Gangs NAKED, dedicated to exposing the methods and works of cybercrime gangs such as “CARBANAK” or similar sophisticated syndicated Cybercrime organizations., In the past. he worked as a web front-end programmer. Also, he is passionate about hardware, hacking, security a...