Yearly Archives: 2015
The surveillance firm Hacking Team is back stronger than before
Motherboard has obtained a non-public email sent by the Hacking Team CEO to its customers that announce a new generation of hacking tools. Hacking Team is the popular surveillance company that suffered […]
How CoinVault or Bitcryptor victims could try to recover their files
Victims of CoinVault ransomware can now rely on a new set of encryption keys added to the free CoinVault Ransomware Decryptor tool to recover their files. Every day, dozens of […]
WhatsApp collects phone numbers, call duration, and a lot of metadata
A group of experts has conducted a research that demonstrates the type of data that can be gathered through the forensic study of WhatsApp. A new research conducted by forensic […]
15-Year-Old has been identified and arrested for TalkTalk Attack
The UK Metropolitan Police announced to have arrested on suspicion of Computer Misuse Act offenses a 15-Year-Old alleged involved in the TalkTalk attack. The UK Metropolitan Police has announced the […]
Duuzer, a data stealer Trojan targets South Korean organizations
Researchers at Symantec uncovered bad actors that have been using a backdoor Trojan dubbed Duuzer to target organizations in South Korea and elsewhere. According to Symantec, threat actors have been […]
Germany probes alleged new case of US espionage: Regin malware infected Gov laptop
The German authorities have launched a probe into allegations of a new case of US espionage after they have found a laptop infected by the Regin Spyware. The German authorities […]
TalkTalk announced hackers have stolen ‘incomplete’ customer bank data
Hackers that recently breached the systems at TalkTalk IPS have stolen ‘incomplete’ customer bank data, states an official announcement issued by the firm. This week the TalkTalk Telecom Group plc has publicly […]
Wikileaks releases CIA Director John Brennan emails
Wikileaks has obtained and immediately released the CIA Director John Brennan private emails. It is a first lot, others will be soon published. A few days ago a teen has violated […]
The ISIL is trying to hack American electrical power companies
US authorities confirmed that hackers belonging to the Islamic State (ISIL) are trying to hack American electrical power companies. According to the U.S. law enforcement, the ISIL is trying to […]
Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the White House
Researchers at Trend Micro discovered a new Adobe Flash Zero-Day used in Pawn Storm Campaign Targeting Foreign Affairs Ministries across the world. Once again Flash in the headlines, beware next […]
US Ports – Cyber attacks can cause the release of dangerous chemicals
US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable to cyber […]
Apple has removed several apps from the official iOS App Store
Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to be intercepted. Apple has pulled several apps out from the […]
MEF – Annual Report 2015 – Payment card frauds
The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who […]
China arrested hackers responding to a US Government request
For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that […]
Hacking enterprise wireless Printers with a drone or a vacuum cleaner
A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post […]
The Smurf Suite – GCHQ can hack your phone with a text message
Snowden told the BBC’s Panorama that the GCHQ has developed a hacking suite dubbed Smurf Suite, it can hack any mobile by sending an encrypted text message. There is no […]
Fareit malware avoids detection using a different file hash for each attack
Security experts at Cisco Talos have discovered a new strain of the Fareit Info stealer that uses a different File hash for each attack to avoid AV Detection Security experts […]
YiSpecter iOS Malware can infect any Apple iOS device
Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken and non-jailbroken devices. The recent XCodeGhost attack suffered by Apple demonstrated that […]
Experian’s data breach puts 15 million T-Mobile users at risk
Experian’s data breach puts 15 million T-Mobile users’ personal information at risk- The company already started the incident response procedure. T-Mobile has announced that data belonging to 15 million consumers may have compromised in a […]
Linux XOR DDoS Botnet delivers potent DDoS attacks
Experts at Akamai discovered the Linux XOR DDoS Botnet, a malicious infrastructure used to run potent DDoS attacks against dozens of targets. Security researchers have discovered a Linux Botnet, dubbed XOR […]
Are you still using TrueCrypt? Beware of these 2 critical flaws!
The popular security expert James Forshaw has discovered two critical flaws in the driver that TrueCrypt installs on Windows systems. Bad news for Windows users who have decided to use […]
Naikon APT Group backed by the Chinese PLA Unit 78020
According a new report the popular Naikon APT group is actually backed by the China’s PLA Unit 78020, a firm traced it through online activity. Ge Xing, also known as “GreenSky27,” is […]
OPM stolen data includes 5.6 Million Fingerprints
According to the a statement by OPM Press Secretary Sam Schumach on Background Investigations Incident OPM breach included 5.6 Million Fingerprints. The press secretary of the Office of Personnel Management, Sam Schumach, announced that the data breach suffered […]
Malvertising campaign targeted the Forbes Website, million users at risks
Security researchers at FireEye have uncovered a new malvertising campaign that exploited the popular Forbes.com news website. Security experts at FireEye have uncovered a new malvertising campaign that exploited the […]
D-Link firmware accidentally includes Code Signing Keys
The Taiwanese networking equipment manufacturer D-Link has accidentally published its private code signing keys in the source of one of its firmware update. According to the Dutch news site Tweakers, the […]
The DUKES APT – 7 years of Russian state sponsored hacking
F-Secure has published an interesting report on the cyber espionage operations conducted by the Dukes APT group, which appears linked to the Kremlin. Security researchers at F-Secure have published an […]
Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs
A Critical vulnerability affects Mozilla Bugzilla bug-tracking software could be exploited to access details of non-public vulnerabilities stored in its database. The open source Bugzilla bug-tracking system is used hundreds of thousands of software organizations […]
Hundreds million potential victims of a new advanced malvertising campaign
Experts at MalwareBytes uncovered a massive malvertising campaign, booby-trapped web ads went undetected for weeks leveraging on the Angler Exploit Kit. In August, threat actors behind a number of major malvertising […]
Department of Energy hacked 159 times between 2010 and 2014
According to a review of federal records obtained by USA Today, the US Department of Energy is among the most targeted government organizations in the US. The US Department of Energy […]
Vodafone Australia has hacked a Fairfax journalist’s phone
The Telecommunications giant Vodafone denies ‘improper behaviour’ after its employee accessed Natalie O’Brien’s phone records to discover its sources. Vodafone Australia has admitted it hacked a journalist’s phone records for […]