Monthly Archives: July 2014
Russian Government issued a Tender to crack Tor
The Russian government has launched a public competition, reserved to Russian entities, offering $111,000 to break Tor encryption. As anticipated in my previous post, law enforcement agencies and intelligence all over the […]
European Central Bank victim of an attempt of cyber extortion
Hackers steal user contact information and other data from a database of the European Central Bank website in an attempt of extortion. Financial institutions are under attack, the number of […]
Nigeria 419 scam targeting business world with RATs
Experts at Palo Alto Networks uncovered a new Nigeria 419 scam scheme which is targeting businesses in a malicous campaign dubbed Silver Spaniel. The Nigeria 419 schema adopted by criminal gangs world wide has […]
Gyges, the mixing of commercial malware with cyber weapon code
Sentinel Labs firm discovered a sophisticated malware dubbed Gyges that is the mixing of commercial malicious code with code of alleged cyber weapon. Experts at Sentinel Labs security firm have discovered Gyges malware in the […]
Siemens industrial products affected by OpenSSL vulnerabilities
The ICS-CERT has issued a security advisory related to the existence of OpenSSL vulnerabilities affecting different Siemens industrial products. Several Siemens industrial products are affected by four vulnerabilities in their OpenSSL implementation which […]
Cybercrime exploits the crash of Malaysia Airlines Flight MH17
Security experts at TrendMicro have detected a spam campaign via Twitter which exploits the incident occurred to Malaysia Airlines Flight MH17. Unfortunately tragedies like the one occurred to the Malaysia Airlines Flight […]
WhatsApp profile picture: a risky feature? In the mind of a hacker
In this post I’ll show you how an apparently insignificant information on Whatsapp could be used by hackers in a more dangerous targeted attack. When you add a random phone […]
Cisco Wireless Residential Gateway Remote Code Execution flaw
Multiple Cisco Wireless Residential Gateway products are affected by a critical flaw that could allow a remote attacker to hijack the devices. A security vulnerability affects multiple Cisco wireless residential […]
Feds issue advisory on keylogger in hotel business centers
US Secret Service and the NCCIC have alerted hoteliers about a potential presence of keyloggers in the machines provided to guests in hotel business centers. US Secret Service and the Department of Homeland Security’s National Cybersecurity […]
Chinese Executive charged of hacking on Boeing and other defense contractors
Chinese Executive charged of Hacking on Boeing and other defense contractors to steal military data and advanced technologic projects. According to a US criminal complaint, computers of Boeing and other military contractors have […]
NightHunter extensive data theft campaign has been active since 2009
Experts from Cyphort Labs have discovered an extensive data theft campaign named Nighthunter that has been active since 2009 stealing victim’s credentials. Security experts at Cyphort firm have recently uncovered […]
Deep Panda hacking team targeting US experts on Iraq
Researchers at CrowdStrike reveal that hacking team dubbed Deep Panda is targeting US think thank firms with a significant knowledge on the Iraqi situation. CrowdStrike security firm revealed that a group of hackers, suspected to […]
Cisco warns on combined spear phishing and exploit attacks
Cisco’s Threat Research Analysis and Communications (TRAC) uncovered an extremely targeted spear phish attack on high-profit companies in Europe. A new APT has been discovered by CISCO targeting high-profit companies […]
North Korea doubles units of its cyber army
North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases to run hacking attacks. The majority of people ignores that […]
APWG report shows the increase of phishing activities in Q1 2014
The APWG Report on Phishing Activity Trends analyzes phishing attacks observed by its member companies and reported to the APWG group. According to the APWG Phishing Activity Trends Report for the first quarter […]
NSA XKeyscore targeted Tor Directory Authority servers
The German broadcaster ARD published a report that reveals that NSA XKeyscore has targeted two Germany-based Tor Directory Authority servers. The NSA surveillance program XKeyscore, according to a report published by German public broadcaster ARD, two Germany-based Tor Directory Authority servers have been targeted […]
Kaspersky Lab reveals an increase in RDP bruteforce attacks
Security experts at Kaspersky Lab have issued data related to the number of RDP brute force attacks on its clients which show a worrying trend. In the June Kaspersky Lab has included […]
Microsoft Seized No-IP Domains, Millions dynamic DNS users affected
Executing an order of a Nevada Court, Microsoft has seized domains belonging to the No-IP.com Dynamic DNS Service affecting the traffic of million users. Microsoft has executed a large-scale operation against a […]
Selfmite, the rare Android worm which spreads itself by sending SMS
Experts at AdaptiveMobile discovered a rare Android SMS worm dubbed Selfmite which spreads itself by sending SMS including a malicious link to the contact list. Security researchers at AdaptiveMobile have discovered a rare Android malware dubbed Selfmite that […]