Monthly Archives: February 2016
Operation Blockbuster revealed the Lazarus Group Activities
The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that is believed to be behind the Sony Pictures hack. State-sponsored hackers allegedly behind […]
Operation Dust Storm, hackers target Japanese Critical Infrastructure
Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security firm Cylance have uncovered a long-running hacking campaign dubbed ‘Operation Dust Storm’ targeting commercial and critical […]
Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center
The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence of the NSA Data Center. The Utah state computer systems […]
Linux Mint was hacked, website served malicious ISO on Saturday
The Linux Mint website had been hacked, on Saturday, intruders were able to compromise it and serve malicious ISO of Linux Mint 17.3 Cinnamon edition. The Linux Mint website had […]
Linux Fysbis Trojan, a new weapon in Pawn Storm’s arsenal
Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy group Pawn Storm. Do you remember the Pawn Storm hacking crew? Security […]
Hollywood Presbyterian Medical Center taken offline; $3.6M ransom
Cyber criminals demanded $3.6M after a ransomware-based attack takes offline the systems at the Hollywood Presbyterian Medical Center. In the “2016 Cyber Security Predictions: From Extortion to Nation-state Attacks” I […]
Should Apple Backdoor iPhones for the US Government?
Apple has claimed to make the most secure smartphones and tablets and for years, that has remained the case. There have been very small malware outbreaks and a few, rare […]
Approximate machine improves the Bitcoin mining by 30 percent
A team of Illinois-based scientists have conducted a research to improve the Bitcoin mining process by 30 percent. Bitcoin mining is becoming a process even more costly in terms of […]
Carbanak cybergang is back and it is not alone
Experts at Kaspersky Lab discovered that Carbanak cybergang is back and other groups are adopting similar APT-style techniques to steal money. Security researchers at the 2016 edition of SAS in Tenerife revealed […]
T9000 backdoor, a sophisticated malware that spies on Skype users
The T9000 backdoor discovered by PaloAlto Networks is able to infect victims’ machines to steal files, take screengrabs, and records Skype conversations. A new threat is targeting Skype users, it […]
Someone has pwned the Dridex botnet serving Avira Antivirus
Unknowns have pwned the Dridex botnet and are using it to spread a legitimate copy of the Avira Antivirus software instead the malicious payload. This story is very intriguing, someone has hacked […]
Malwarebytes working hard to fix flaws in its antivirus
The Antivirus firm Malwarebytes is spending a significant effort to fix serious vulnerabilities in its defense solution that was reported by the experts at the Google’s Project Zero team. The […]
Cybersecurity Operational Tests And Assessments – US Defence can’t check F-35 data due to insecure systems
Cybersecurity Operational Tests And Assessments conducted by the US Defence are essential to improve overall security … and discover that US Govt can’t check F-35 data due to insecure systems. […]
ENISA Threat Landscape 2015, a must reading
ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I’m very happy to announce you the publication of the annual ENISA […]
A FOP data dump leaked online, 2.5GB of police contracts and data
The Fraternal Order of Police (FOP), a US Police Organisation, has been hacked and 2,5GB data dump leaked online. A data dump related to a US police association has been […]
Two thirds of the Android devices are vulnerable to Lockdroid ransomware
Experts at Symantec detected Lockdroid a new piece of Android ransomware capable of locking devices and fully wiping user data via factory resets. A new strain of ransomware called Lockdroid […]