id stringlengths 3 10 | content stringlengths 2 25k |
|---|---|
2367_37417 | The German Government has confirmed that hackers who breached the Bundestag systems a couple of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, the Germany’s parliament, confirmed that unknown hackers have stolen data during the cyber attack, the investigators have uncovered seve... |
1303_26247 | In the June Kaspersky Lab has included in its products an Intrusion Detection System, which allowed the company to analyze more information on going attacks on its clients. Kaspersky has issued the data related to RDP (Remote Desktop Protocol) bruteforce attack attempts detected by its solutions, the number of these o... |
1272_25804 | The World Cup 2014 is an excellent occasion for cyber criminals to trick users with social engineering techniques into downloading any kind of malicious content. Of course mobile users are a privileged target for cyber criminals, different World Cup-themed malicious apps have been detected by security experts in this p... |
7680_80386 | The Total Donations WordPress plugin was abandoned by its developers for this reason security experts are recommending to delete it after they discovered multiple zero-day flaws that were exploited by threat actors., The news was reported by security firm Wordfense that observed threat actors are exploiting the zero-da... |
4867_56283 | Adobe released security updates that address two dozen vulnerabilities in Flash Player, Digital Editions, and the Campaigns marketing tool., Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. The updates address critical vulnerabilities that could be exploited by an ... |
3789_47637 | The FBI is warning actors in the private sector about a rapid diffusion of stealthy keystroke loggers disguised as USB phone chargers., The FBI issued a Private Industry Notification warning of the abuse of KeySweeper components that are able to sniff everything users type into wireless keyboards., I have written about... |
6575_71450 | In the last weeks, I wrote about a massive ransomware attack against computer systems in the City of Atlanta., The ransomware infection has caused the interruption of several city’s online services, including “various internal and customer-facing applications” used to pay bills or access court-related information., Inv... |
5762_63617 | The flaw was discovered by experts at Siemens and could be exploited by remote attackers to hack some of Siemens industrial communications devices., The vulnerability affects SCALANCE X industrial Ethernet switches, and Ruggedcom switches and serial-to-ethernet devices running the Rugged Operating System (ROS)., , The ... |
499_12474 | There is no peace for enterprises, in few weaks we have discovered how much vulnerable are giants of IT, one after another, fell the most renowned names from Facebook to Twitter, companies that we considered immune from thousands of attacks they receive each day., Until now Microsoft and Apple weren’t affected … but it... |
4020_49497 | Recently, experts from the SentinelOne security firm spotted a sophisticated malware dubbedSFG, a spawn of Furtim malicious code, targeting at least one European energy company., Media speculated the existence of a powerful SFG malware, a sort of new Stuxnet, that was spread by an unknown government to target companies... |
4746_55354 | The RIG exploit kit is even more popular in the criminal ecosystem, a few days ago security experts at Heimdal Security warned of a spike in cyber attacks leveraging the popular Neutrino and RIG EKs., Now security experts from Heimdal Security are warning of a new campaign leveraging the RIG exploit kit that targets ou... |
2160_35833 | A major obstacle that management must face in today’s world is the task of securing their organization’s assets. While physical security is a huge component in ensuring that the residual risk level existing within the environment remains at an acceptable level, our reliance on the Internet as a primary resource introd... |
452_11603 | In this period there is an intense debate on the wiretapping of every communication channel, governments are increasing the monitoring of internet, of social network platforms and VOIP conversations in many cases with supports of the companies that provide those services. In a recent post I discussed on the control ord... |
1640_30232 | A fresh C93 phishing Scam targeting Microsoft’s Windows Outlook Users. Online scammers have unleashed a bogus “c93 virus” targeting Windows Outlook users in a wide phishing campaign aimed at stealing users’ login credentials, warns security researchers. It all starts with a phishing email allegedly from Windows Outlook... |
3898_48531 | Adobe has issued the Flash Player 22.0.0.192, a release that fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft in attacks on high-profile targets., The Flash Player flaw CVE-2016-4171 affects versions 21.0.0.242 and earlier for Windows, Mac, Linux and Chrome OS, a... |
4248_51261 | It’s time to patch your systems, especially if you have installed Adobe Flash Player. Adobe has released Security updates to fix critical Flash vulnerabilities that affect any OS (Windows, Mac, Linux), including ChromeOS., The security vulnerabilities in flash could be exploited by attackers to gain the control over th... |
7033_75212 | Security experts at Trustwave have released Social Mapper, a new open-source tool that allows finding a person of interest across social media platform using facial recognition technology., The tool was developed to gather intelligence from social networks during penetration tests and are aimed at facilitating social e... |
5253_59373 | “In my previous post on Yahoobleed #1 (YB1), we saw how an uninitialized memory vulnerability could lead to disclosure of private images belonging to other users. The resulting leaked memory bytes were subject to JPEG compression, which is not a problem for image theft, but is somewhat lacking if we wanted to steal mem... |
900_20637 | Israeli Security Researchers at Tel Aviv University recently published an interesting paper titled “RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis” to explain how they have successfully broken 4096-bit RSA analyzing Computer’s CPU Sound emitted during execution of decryption routines., The trio of scientis... |
7426_78085 | A new variant of the infamous APT28 Lojax (aka Double-Agent) has been discovered by the Cybaze ZLab – Yoroi team. It is the latest version of the well-known rootkit Double-Agent, previously analyzed by ESET researchers., The behavior of the Lojax sample seems to be similar to the previous versions and exploits the legi... |
5223_59139 | The security researcher at Google Neel Mehta published a mysterious tweet using the #WannaCryptAttribution hashtag. What did he mean?, 9c7c7149387a1c79679a87dd1ba755bc @ 0x402560, 0x40F598ac21c8ad899727137c4b94458d7aa8d8 @ 0x10004ba0, 0x10012AA4#WannaCryptAttribution, — Neel Mehta (@neelmehta) May 15, 2017, , According... |
1856_32615 | Even the giants have their Achilles heel, the Google Apps administrator console is affected by a critical cross-site scripting (XSS) vulnerability that could be exploited by attackers to force a Google Apps admins to execute request on the domain., The unknown flaw was first discovered by application security engineer... |
7298_77153 | Millions of voter records are available for sale on the Dark Web, experts from Anomali and Intel 471 discovered 35 million US voter records for sale in a hacking forum., Researchers have analyzed a sample of voter records and determined the data to be valid with a high degree of confidence., Records in the voter regist... |
5412_60639 | The Russian Government threatened to ban Telegram because it refused to comply data protection laws., “There is one demand, and it is simple: to fill in a form with information on the company that controls Telegram,” said Alexander Zharov, head of Roskomnadzor. , “And to officially send it to Roskomnadzor to include th... |
4312_51820 | D-Link ‘s DWR-932B LTE router and access point has been found vulnerable to a number of backdoors as well as a default WPS (Wi-Fi Protected Setup) PIN., Security researcher and blogger, Pierre Kim, has uncovered a number of security flaws in the device that even affect the latest version of its firmware., Kim had previ... |
6307_68854 | Swiss telco company Swisscom confirmed it has suffered a data breach that affected roughly 800,000 of its customers, roughly 10% of the Swiss population., According to Swisscom, unauthorized parties gained access to data in Autumn, the attackers accessed the customers’ records using a sales partner’s credentials., The ... |
1839_32417 | Last week the another alleged member of the popular Lizard Squad was arrested by UK authorities, the British Police in collaboration with the FBI identified a 18-year-old boy that is suspected to have participated to the to the DDoS attacks on the PlayStation Network and Xbox Live services., The Lizard Squad was advert... |
3661_46693 | Security experts at Blue Coat have spotted a new campaign spreading an Android Ransomware dubbed Dogspectus. The malicious code hijacks mobile advertisements to scam gift cards, it locks the device in a state that allows only victims to make payment., The malicious code demands the payment of a $200 fee in iTunes gift ... |
509_12634 | It’s a very difficult period for security researchers that in the last months have discovered various cyber espionage campaigns that hit governments, private businesses and intelligence agencies all over the world., The situation is very concerning, silently cyber threats attacks the above institutions to steal sensiti... |
7346_77460 | Crooks continue to abuse unprotected Docker APIs to create new containers used for cryptojacking., Earlier this year Sysdig and Aqua Security researchers started observing cyber attacks targeting Kubernets and Docker instances aimed at mining Monero cryptocurrency., A container is a package that contains an application... |
2168_35894 | Unknown hackers have breached the system of the German flag carrier Lufthansa, the news was reported first by the German magazine Der Spiegel., The attackers accessed individual passenger accounts on the company’s website LH.com as confirmed by the company on Friday., Lufthansa immediately started the operations to mit... |
4196_50836 | In the last months, numerous IT companies suffered a major data breach, including Dropbox, LinkedIn, MySpace, VK.com, and Tumblr. The criminal underground is flooded by login credentials from the above services that offered for sales by hackers., These credentials could be used by hackers to target other services onlin... |
6527_71049 | Microsoft Malware Protection Engine is the core component for malware detection and cleaning of several Microsoft anti-malware software. It is currently implemented in Windows Defender, Microsoft Security Essentials, Microsoft Endpoint Protection, Windows Intune Endpoint Protection, and Microsoft Forefront Endpoint Pro... |
2087_35204 | “Findings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to collect and use personal driver information” says a recent report by Senator Edward J. Markey, Every day, more and more new device... |
166_3951 | Groups of hacktivist like Anonymous are the actual news of the global technology landscape, a new force with which and against which confront. As repeatedly stressed I consider the moment of confrontation with the group a moment of growth for the IT professional in many ways, on all:, Obviously we are talking about a g... |
693_16871 | XKeyscore, NSA former technicians Edward Snowden revealed that the agency has another secret program to spy on user’s Internet experience tracking practically every his activity … PRISM isn’t an isolated surveillance program., The NSA tool collects ‘nearly everything a user does on the internet’, XKeyscore gives ‘wides... |
3037_42111 | European Union countries are planning to ban virtual currencies and any form of anonymous payments online, even through pre-paid cards. According to a draft document seen by journalists at the Reuters Agency, the initiative aims to tackle terrorism financing after the recent tragic Paris attacks., A crisis meeting will... |
2502_38390 | Hacking Team has been hacked and its social media account hijacked, the news is shocking the IT security industry because privacy advocated have always accused the company to sell surveillance products and hacking tools to repressive regimes. The unknown attackers have exfiltrated some 400Gbs of data that have been upl... |
6698_72584 | Anton Cherepanov, security expert form ESET researcher, discovered two zero-days while analyzing a malicious PDF, according to the researcher the mysterious hacker(s) were still working on the exploits., The malicious PDF was discovered late in March 2018 (Two suspicious PDF samples zero-day 1, zero-day 2), the analysi... |
38_430 | Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more or less aggressive viruses that cause many damages to public infrastructure to private citizens and sometimes endangering human life itself. But when we are dealing with someone that has different works... |
3748_47320 | A second bank was a victim of a malware-based attack, the news was recently confirmed by the SWIFT. The investigation conducted by the security researchers at BAE Systems are making the situation very intriguing because according to experts the cyberheist at the Bangladesh Bank, and at an unnamed commercial bank in Vie... |
3092_42483 | Signal is a free and open-source encrypted voice calling and instant messaging application for mobile devices. It runs on both iOS and Android and uses advanced end-to-end encryption protocols to protect communications from prying eyes., Signal has bean developed by Moxie Marlinspike, co-founded of the Open Whisper Sys... |
6566_71385 | Researchers at Security Research Labs (SRL) that the problem also involves major vendors, including HTC, Huawei, and Motorola., In some cases, manufacturers roll out incomplete security patches leaving the devices vulnerable to cyber attacks., “Phones now receive monthly security updates. Installing patches every month... |
3557_45802 | Security experts from the MalwareHunterTeam have spotted a news train of ransomware, called KimcilWare, specifically designed to target Web servers, and more specifically Magento e-commerce platforms., “A new ransomware called KimcilWare has been discovered that appears to be targeting web sites using the Magento eComm... |
2751_40046 | Last month hackers breached the popular adultery website Ashley Madison and leaked online a dump containing data belonging to 37 Million users, including 37 Million of encrypted password., News of the day is that a group of hackers which calls itself CynoSure Prime, has cracked more than 11 Million user hashed password... |
7632_79943 | Security experts at Check Point discovered several issues in the popular online battle game Fortnite. One of the flaws is an OAuth account takeover vulnerability that could have allowed a remote attacker to takeover gamer accounts tricking players into clicking a specially crafted link., Remaining flaws discovered by t... |
6916_74342 | Adobe on Tuesday has released July Patch Tuesday security updates that addressed more than 100 flaws in its products, including 105 vulnerabilities in Acrobat and Reader, two in Flash Player, three in Experience Manager, and three in Connect., Windows and macOS versions of Adobe Acrobat and Reader were affected by tens... |
4604_54299 | A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices., A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the article, the cellular surveillance system was cost... |
1356_26947 | Googlebots crawl websites are the software used to index and rank the content of websites for the popular search engine. It’s not a mystery that the visits of Googlebots are not considered a possible indicator for activities related to cyber threats, for this reason principal defensive solutions don’t block this kind o... |
1930_33431 | What is the underground economy?
Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime. It’s within these communities that cybercriminals gather to trade tools, services and victims’ credentials., W... |
1858_32642 | It is difficult to understand right now how true the news, but according to rumors circulating in the Internet the popular hacking collective Lizard Squad, responsible for the attacks against Sony PSN, XBox live and Tor network, is working on a PlayStation 4 Jailbreak that could be released within the year., The avail... |
973_21651 | Israeli Defense is another illustrious victim of spear phishing attack, just on Friday Microsoft suffered a similar attack and attackers breached the email accounts of its staff accessing to documents on law enforcement inquiries. Reuters agency reported that hackers penetrated into an Israeli defense ministry computer... |
1002_22081 | The Polish Computer Emergency Response Team has documented a series of cyber attacks observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can conduct MITM attacks on online banking connection. The techniques could be used to target also users from other countries ... |
4783_55660 | We all recognize the importance of the Tor network, an important instrument to protect users’ anonymity and avoid censorship. Today I desire to present you an interesting initiative launched by Tor passionates, the TorWorld, belonging to the CryptoWorld Foundation., The CryptoWorld Foundation groups several organizatio... |
2258_36591 | We discussed several times about the opportunity to hack medical devices and the needs of security by design for these objects. In 2012 the US Government Accountability Office (GAO) published a report that highlighted the necessity to secure medical devices such as implantable cardioverter defibrillators or insulin pum... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.