Monthly Archives: June 2016

PunkeyPOS might have already stolen millions of payment card numbers

Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen millions of payment card numbers. Security experts from PandaLabs spotted a new strain of […]

Posted in Cyber Security News | Comments Off on PunkeyPOS might have already stolen millions of payment card numbers

Fansmitter – exfiltrating data from Air-Gapped devices via fan noises

Fansmitter is a new acoustic data exfiltration method devised by a group of researchers from Ben-Gurion University of the Negev. We all know that air-gapped networks aren’t totally secure, in the past, […]

Posted in Cyber Security News | Comments Off on Fansmitter – exfiltrating data from Air-Gapped devices via fan noises

Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking

A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the […]

Posted in Cyber Security News | Comments Off on Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking

BadTunnel attack affects all versions of Windows

A Chinese security researcher has discovered a Windows design flaw dubbed BadTunnel that affects all versions of Windows. The Chinese researcher Yang Yu, director of Xuanwu Lab of Tencent has discovered […]

Posted in Cyber Security News | Comments Off on BadTunnel attack affects all versions of Windows

GoToMYPC targeted by a very sophisticated password attack

A number of users are experiencing problems during logging into GoToMyPC because Citrix reset account passwords after hackers reportedly attacked it. It’s official, the GoToMyPC service operated by Citrix is the […]

Posted in Cyber Security News | Comments Off on GoToMYPC targeted by a very sophisticated password attack

Adobe patches Flash Zero-Day exploited by ScarCruft APT

Adobe Flash Player 22.0.0.192 release fixes the Flash Player zero-day vulnerability (CVE-2016-4171) exploited by the APT group dubbed ScarCruft. Adobe has issued the Flash Player 22.0.0.192, a release that fixes the Flash […]

Posted in Cyber Security News | Comments Off on Adobe patches Flash Zero-Day exploited by ScarCruft APT

Singapore will isolate Government Computers from the Internet

The Government of Singapore will cut off civil servants’ work computers from the Internet in order to secure Government networks. The Singapore’s prime Minister Lee Hsien Loong confirmed this week […]

Posted in Cyber Security News | Comments Off on Singapore will isolate Government Computers from the Internet

CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the Angler Exploit Kit. Crooks behind the CryptXXX ransomware have launched a new […]

Posted in Cyber Security News | Comments Off on CRYPTXXX campaigns, threat actors switch to Neutrino EK

WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

WauchulaGhost Hacker groups linked to Anonymous hijack ISIS supporters’ Twitter accounts and flood their profiles with PORN picture and irreverent messages. Anonymous is continuing its online battle against the ISIS propaganda […]

Posted in Cyber Security News | Comments Off on WauchulaGhost targets ISIS Twitter Accounts and floods them with porn images

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the Teslacrypt Ransomware variants In May, the criminals behind the TeslaCrypt ransomware leaked […]

Posted in Cyber Security News | Comments Off on How to recover files encrypted by all Teslacrypt Ransomware variants

Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs

Hackers discovered it is possible to remotely control features of Mitsubishi Outlander PHEV by hacking the mobile applications designed by the car vendor. A team of experts from the UK […]

Posted in Cyber Security News | Comments Off on Hackers can remotely disable car alarm on Mitsubishi Outlander PHEV SUVs

Jacob Appelbaum leaves the Tor Project after accusation of sexual misconduct

The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is recognized as one of the most active and influential digital […]

Posted in Cyber Security News | Comments Off on Jacob Appelbaum leaves the Tor Project after accusation of sexual misconduct

FastPOS PoS malware implements a quick exfiltration method

Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration technique. Security experts at Trend Micro have spotted a new […]

Posted in Cyber Security News | Comments Off on FastPOS PoS malware implements a quick exfiltration method

Power plant ICS threatened by an easy remotely exploitable flaw

The independent researcher Maxim Rupp reported an unpatchable flaw in the ICS Environmental Systems Corporation (ESC) 8832 Data Controller. Vulnerable SCADA and industrial control systems represent the entry point in critical infrastructure for hacking […]

Posted in Cyber Security News | Comments Off on Power plant ICS threatened by an easy remotely exploitable flaw

Hacking NTP Servers from Long-Distance with low cost devices

A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive equipment. The HACK IN THE BOX conference is a hotbed of interesting […]

Posted in Cyber Security News | Comments Off on Hacking NTP Servers from Long-Distance with low cost devices

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X