Monthly Archives: March 2013

Largest DDoS of ever vs Spamhaus a menace to global internet

What’s happening to internet? Who threatened to destroy it and how it is possible to do? Exactly one year ago Anonymous menaced the world of internet with a failed campaign […]

Posted in Uncategorized | Comments Off on Largest DDoS of ever vs Spamhaus a menace to global internet

Exclusive -Details on Investigation of Group-IB on new age of POS malware

By Pierluigi Paganini, Editor-in-Chief Group-IB: New age of POS malware – cashpoints are in the hacker’s interest, major US banks are compromised According to the statistics of Group-IB, one of the […]

Posted in Uncategorized | Comments Off on Exclusive -Details on Investigation of Group-IB on new age of POS malware

First APT attack on Android targeted Tibetan and Uyghur activists

By Pierluigi Paganini, Editor-in-Chief Read about APT attacks has become customary, even easier to ear of attacks against political dissidents or minorities as Tibetan and Uyghur activists, but never before has been […]

Posted in Uncategorized | Comments Off on First APT attack on Android targeted Tibetan and Uyghur activists

OpIsrael and attack to Mossad, cyber dispute or misinformation campaign?

By Pierluigi Paganini, Editor-in-Chief Israel is considered by various groups of hacktivists an enemy state to fight, for this reason they decide a joint operation to start on April 7th […]

Posted in Uncategorized | Comments Off on OpIsrael and attack to Mossad, cyber dispute or misinformation campaign?

Mobile Botnets: are all around us!

Anticipations on mobile botnets’ existence have been ended by the Damballa Research Laboratory official reports which discovered 40,000 infected mobile devices that have communicated through cybercriminal C&C servers for the […]

Posted in Uncategorized | Comments Off on Mobile Botnets: are all around us!

Multiplatform Wiper widespread in attacks against South Korea

By Pierluigi Paganini, Editor-in-Chief Recently South Korea has been hit by powerful cyber attack malware based, network provided by LG UPlus Corp was hacked by a group calling itself the “Whois Team”. […]

Posted in Uncategorized | Comments Off on Multiplatform Wiper widespread in attacks against South Korea

Also China under attack

By Pierluigi Paganini, Editor-in-Chief Recent cyber attacks against North and South Korea are inflaming the debate on the importance of cyber security, governments are massively investing in the improvement of […]

Posted in Uncategorized | Comments Off on Also China under attack

NATO and definition Rules For Cyber Warfare

By Pierluigi Paganini, Editor-in-Chief Recent explosion of cyber attacks worldwide demonstrating the difficulty to maintain order and stability in the cyberspace, within individual states and among the states themselves. Deterrence […]

Posted in Uncategorized | Comments Off on NATO and definition Rules For Cyber Warfare

FinFisher found everywhere, more complexity and ready for mobile

By Pierluigi Paganini, Editor-in-Chief Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies […]

Posted in Uncategorized | Comments Off on FinFisher found everywhere, more complexity and ready for mobile

Tension on the Korean Peninsula, cyber armies to comparison

By Pierluigi Paganini, Editor-in-Chief North Korea is the center of attention these days for its questionable political strategies and for the dispute raging with the entire West. The contrasts have an […]

Posted in Uncategorized | Comments Off on Tension on the Korean Peninsula, cyber armies to comparison

Gaming platforms as vector of cyber attack according ReVuln

By Pierluigi Paganini, Editor-in-Chief The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to convert local bugs and features in remotely exploitable […]

Posted in Uncategorized | Comments Off on Gaming platforms as vector of cyber attack according ReVuln

Android Malware Seeds for Sale

By Pierluigi Paganini, Editor-in-Chief One of the leading computer security companies of Russia, Group-IB and  its CERT (CERT-GIB), found that Android malware is available for sale by cyber criminals. With explosion of mobile market […]

Posted in Uncategorized | Comments Off on Android Malware Seeds for Sale

Threat Intelligence Report by Solutionary, rise of cyber attacks

By Pierluigi Paganini, Editor-in-Chief Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to […]

Posted in Uncategorized | Comments Off on Threat Intelligence Report by Solutionary, rise of cyber attacks

Microsoft Skype accused of supporting the surveillance in China

By Pierluigi Paganini, Editor-in-Chief In many occasion we have discussed about the consequences of monitoring activities on internet and communication channels operated by governments all over the world, in particular of […]

Posted in Uncategorized | Comments Off on Microsoft Skype accused of supporting the surveillance in China

The offer of Russian underground for phishing campaigns

By Pierluigi Paganini, Editor-in-Chief Security experts consider the analysis and study of underground crucial to better understand the way cybercrime use to operate and which are the most prolific monetization […]

Posted in Uncategorized | Comments Off on The offer of Russian underground for phishing campaigns

The malicious mobile marketplace explained by Group-IB

By Pierluigi Paganini, Editor-in-Chief Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and exploit tools. In this post I desire to propose to […]

Posted in Uncategorized | Comments Off on The malicious mobile marketplace explained by Group-IB

Digital certificate stolen to Bit9 used to sign Java exploit

By Pierluigi Paganini, Editor-in-Chief According security experts the numerous cyber attacks that hit principal IT companies, news agencies and government offices exploited zero-day vulnerabilities in Java software to the point that many […]

Posted in Uncategorized | Comments Off on Digital certificate stolen to Bit9 used to sign Java exploit

Threat Report H2 2012 proposed by F-Secure

By Pierluigi Paganini, Editor-in-Chief Today the principal channel for malware diffusion is considered as internet, large diffusion of exploit kits and crime ware such as Black Hole, Cool Exploit and Incognito have […]

Posted in Uncategorized | Comments Off on Threat Report H2 2012 proposed by F-Secure

How to organize a botnet in a rapid, efficient and economical

By Pierluigi Paganini, Editor-in-Chief Dancho Danchev, one of the most popular security experts and observer of cyber criminal underground, described in the last weeks a new service offering access to […]

Posted in Uncategorized | Comments Off on How to organize a botnet in a rapid, efficient and economical

US tries to scare waves of hackers proposing a retaliation strategy

By Pierluigi Paganini, Editor-in-Chief The chronicle is full of news related to cyber attacks against government agencies and private industries, group of organized hackers, but also novice cyber criminals everyday […]

Posted in Uncategorized | Comments Off on US tries to scare waves of hackers proposing a retaliation strategy

Evernote hacked, how to respond to yet another data breach?

Another noisy attack has alerted IT community, online note service Evernote is the latest firm to get hacked. The company provides the popular service to around 50 million users,  the […]

Posted in Uncategorized | Comments Off on Evernote hacked, how to respond to yet another data breach?

Phishing reloaded, the migration to mobile

By Pierluigi Paganini, Editor-in-Chief Recent studies of principal security firms revealed that phishing activities in the last years have increased exponentially; cybercrime is targeting every sector from industry to government […]

Posted in Uncategorized | Comments Off on Phishing reloaded, the migration to mobile

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X