Yearly Archives: 2014
Dyre Zeus variant malware used for corporate espionage
Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the name of a new variant of the immortal Zeus banking trojan worries cyber […]
Treasure Map – Fiveeyes tap into German telco networks to map end devices
Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of […]
High-Risk flaws affect the NOAA Satellite System JPSS
The NOAA JPSS System is affected by thousands vulnerabilities, according to a memorandum from the Department of Commerce’s Office of the Inspector General. The Satellite systems at NOAA (National Oceanic […]
AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance
Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several industries. Security experts at AlienVault Labs have uncovered a watering hole attack with a […]
The Chinese Government runs MitM attack on Google users
The Chinese Government is running a MITM attack on SSL encrypted traffic between Chinese China Education and Research Network and Google. Google website, like many other web services, is blocked by the […]
CERT disclosed the list of most popular vulnerable Android apps
The CERT has published the results of its test conducted on popular Android applications that fail to properly validate SSL certificates. In several posts we have discussed about the improper validation […]
Namecheap accounts compromised using the CyberVor’s archive
Hosting provider Namecheap warned its customers that hackers compromised some of its users’ accounts using the CyberVor’s archive of credentials. Hosting provider Namecheap announced that earlier this week that hackers compromised some of its users’ accounts, apparently using the […]
Bogus cellphone towers found in the US
CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical […]
Brazilian cyber criminals targeting home routers
Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers by using a web-based attack. Experts at Kaspersky Lab have […]
Alleged iCloud flaw exploited in Naked celebrity hack
Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the “Find my IPhone” feature. An alleged hack of Apple’s iCloud accounts of many celebrities seems to […]
APWG Q2 2014 report, phishing is even more dangerous
The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and Retail Sites. The APWG has published its new report related to phishing […]
Oil and energy industry in Norway is under attack
According to a government agencies around 300 oil and energy companies in Norway have been targeted by one of the biggest hacking campaign. Nearly 300 oil and energy companies in Norway have […]
Major cyber attacks hit 5 US banks including JPMorgan
US law enforcement and private security firms are investigating on a series of cyber attacks which hit JPMorgan and other financial institutions. The FBI announced that the Bureau is investigating media reports of cyber […]
A dark wing of the intelligence supports the Tor Project
Experts working at US and UK Intelligence agencies on monthly base leak Tor vulnerabilities to the developers at the Tor Project. The BBC reported that the executive director of the Tor Project revealed that both US and UK intelligence agencies share bugs anonymously with […]
900,000 Android Phones Hit by Ransomware in 30 days
You are guilty of child porn, child abuse, zoophilia or sending out bulk spam. You are a criminal. The Federal Bureau of Investigation has locked you out of your phone […]
FBI warns healthcare industry on possible cyber attacks
FBI is warning businesses operating in the healthcare industry on possible cyber attacks. The FBI is alerting the healthcare industry companies on potential cyber attacks, the law enforcement are warning companies […]
Operation Arachnophobia, targeted attacks from Pakistan
Operation Arachnophobia is a cyber espionage campaign originated in Pakistan descovered by experts from FireEye and ThreatConnect. Researchers from FireEye and ThreatConnect recently conducted a joint investigation on a series of […]
Hackers have stolen credit card data from 51 UPS stores in the US
Hackers have compromised with a malware the system at 51 UPS Stores across the United States, customers’ credit card data may have been exposed. UPS is the last clamorous victim […]
New malware based attacks hit opponents in Syria and all over the world
Security Experts at Kaspersky Global Research & Analysis Team have discovered several malware based attacks targeting opponents of the Regime in Syria. Malware is the most diffused cyber threat used by governments […]
Microsoft confirmed that a faulty patch is causing BlueScreen
Microsoft is investigating on potentially faulty Windows security update that is causing some systems to crash with bluescreen error. Last Friday, Microsoft urged its users to uninstall the latest security updates […]
HACIENDA, GCHQ Port Scanning Program on a wide-scale
New revelation on British GCHQ confirms the existence of the HACIENDA Port Scanning Program which is targeting systems in 27 countries. In the last years the British GCHQ has conducted numerous hacking operation against […]
Grocery giants ALBERTSONS and SUPERVALU confirmed data breach
US Grocery giants ALBERTSONS and SUPERVALU have confirmed a data breach that could impact customers who acquired product in national stores. The Grocery giants Albertsons and SUPERVALU posted on Thursday […]
NSA accidentally caused the 2012 Syrian Internet blackout
Edward Snowden revealed that NSA hacking elite team TAO accidentally caused Syria’s internet blackout in 2012 during a cyber espionage operation. Two years ago Syria suffered a huge Internet blackout, the […]
The network of USIS compromised by a cyber attack
Internal network of USIS was compromised by a cyber attack which has exposed Government Employees’ Data. Investigators speculate on a state-sponsored attack The USIS (U.S. Investigations Services), which provides background […]
F-Secure discovered Xiaomi handset spying on users’data
Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located in China a lot of user’s data. Xiaomi, one of the […]
Malicious Facebook color changer App infected 10000 Users worldwide
Security Experts at Cheetah Mobile have uncovered a new scam based on a fake Facebook Color Changer App which infected 10000 users worldwide. Facebook is a privileged target for cyber […]
Russian crime ring amasses over a Billion credentials
Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data breaches worldwide. Experts at Hold Security revealed to have discovered […]
China bans Symantec & Kaspersky from the list of antivirus suppliers
China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use of foreign technology. Cyber espionage is the first concern of government, China and US exchanged […]
Al-Qaeda usage of encryption after Snowden leaks (Part 2)
Web Intelligence experts at Recorded Future issued the second part of the analysis on the usage of encryption by Al-Qaeda after the Snowden leaks. In May 2014 web intelligence firm Recorded […]
Zero-day flaws affect Symantec Endpoint Protection
Pen Testers at Offensive Security discovered Zero-day flaws in Symantec Endpoint Protection that could be exploited to gain full system access. Yesterday I reported the results of the study conducted by the […]