Monthly Archives: June 2016

PunkeyPOS might have already stolen millions of payment card numbers

Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen…

Fansmitter – exfiltrating data from Air-Gapped devices via fan noises

Fansmitter is a new acoustic data exfiltration method devised by a group of researchers from Ben-Gurion University…

Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking

A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed…

BadTunnel attack affects all versions of Windows

A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of…

GoToMYPC targeted by a very sophisticated password attack

A number of users are experiencing problems during logging into GoToMyPC because Citrix reset account passwords after…

Adobe patches Flash Zero-Day exploited by ScarCruft APT

Adobe Flash Player 22.0.0.192 release fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group…

Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants’ work computers from the Internet in order to…

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit…

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters’ Twitter accounts and flood their profiles with PORN…

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted…

Show Buttons
Hide Buttons