Monthly Archives: April 2016
Pro-ISIS Hackers issued Kill List Of US Gov personnel
Pro-ISIS hackers belonging to the United Cyber Caliphate issue a kill list that includes dozens of U.S. government personnel. A few days ago, the US Government announced the first attack conducted by […]
Dutch police seize the Ennetcom encrypted communication network
The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users. Another success of the Dutch law enforcement against the cybercrime. The […]
Bangladesh Bank heist gang used malware and could strike again
A report published by the BAE firm reveals that criminals who stole $101 million from Bangladesh bank used a malware and could strike again. In March 2016, unknown hackers have […]
Misconfigured MongoDB exposed 93 million Mexican voter records
The security expert Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records. Once again a MongoDB poorly configured exposed million records, once again data of voters […]
Multigrain PoS malware exfiltrates stolen card data over DNS
FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates it over DNS. Security experts at FireEye have spotted a […]
The Four Element Sword, weaponized document builder used in APT Attacks
Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networks’ Security Engineering and Response Team (ASERT) have spotted […]
Lottery security director hacked random number generator to rig lotteries
New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year. Last year, the security director of a US lottery was […]
Canadian law enforcement obtained BlackBerry Global encryption Key
A report published by the VICE News confirmed that the Canadian law enforcement obtained the BlackBerry encryption Key under the investigation Op Clemenza. BlackBerry is probably the first mobile vendor […]
British youngster pleading guilty to booter and malware sales
Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the world. Not always crime pays, sometimes the bill can be very salty, […]
Security experts shut down the dreaded Mumblehard botnet
Researchers and law enforcement in a joint effort shut down the Mumblehard botnet composed of more than 4000 Linux machines. Security experts have shut down a spam botnet, known as Mumblehard, composed of […]
HTTP/2: What does it change and will it eliminate the need for a CDN?
The world has become accustomed to major technological advances happening every year. It’s taken for granted that the new iPhone’s capabilities will dwarf last year’s model and the new Windows […]
FBI reveals BEC attacks pilfered $2.3bn from US companies
According to a report recently issued by the FBI, cyber criminals have pilfered more than $2.3bn from 17,642 victims since 2013 with BEC attacks. According to the FBI, cyber criminals […]
Why malware like the Samsam ransomware are so dangerous for hospitals?
The FBI issued a confidential urgent “Flash” message to the businesses and organizations about the Samsam Ransomware, why it is so dangerous? It is emergency, every week security experts launch […]
German intelligence Agency BND spied on Netanyahu
The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to the German weekly Der Spiegel, the German intelligence Agency BND […]
A NIST guide tells enterprises how to secure email systems
For the first time in a decade, the US National Institute of Standards and Technology (NIST) has updated its secure email guide. The last effort of the NIST Agency in […]
Feds request Judge to review the order to reveal TOR Exploit Code
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeks […]