Monthly Archives: April 2016

Pro-ISIS Hackers issued Kill List Of US Gov personnel

Pro-ISIS hackers belonging to the United Cyber Caliphate issue a kill list that includes dozens of U.S. government personnel. A few days ago, the US Government announced the first attack conducted by […]

Posted in Cyber Security News | Comments Off on Pro-ISIS Hackers issued Kill List Of US Gov personnel

Dutch police seize the Ennetcom encrypted communication network

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users. Another success of the Dutch law enforcement against the cybercrime. The […]

Posted in Cyber Security News | Comments Off on Dutch police seize the Ennetcom encrypted communication network

Bangladesh Bank heist gang used malware and could strike again

A report published by the BAE firm reveals that criminals who stole $101 million from Bangladesh bank used a malware and could strike again. In March 2016, unknown hackers have […]

Posted in Cyber Security News | Comments Off on Bangladesh Bank heist gang used malware and could strike again

Misconfigured MongoDB exposed 93 million Mexican voter records

The security expert  Chris Vickery discovered a 132 GB MongoDB database open online and containing 93.4 million Mexican voter records. Once again a MongoDB poorly configured exposed million records, once again data of voters […]

Posted in Cyber Security News | Comments Off on Misconfigured MongoDB exposed 93 million Mexican voter records

Multigrain PoS malware exfiltrates stolen card data over DNS

FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates it over DNS. Security experts at FireEye have spotted a […]

Posted in Cyber Security News | Comments Off on Multigrain PoS malware exfiltrates stolen card data over DNS

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networks’ Security Engineering and Response Team (ASERT) have spotted […]

Posted in Cyber Security News | Comments Off on The Four Element Sword, weaponized document builder used in APT Attacks

Lottery security director hacked random number generator to rig lotteries

New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year. Last year, the security director of a US lottery was […]

Posted in Cyber Security News | Comments Off on Lottery security director hacked random number generator to rig lotteries

Canadian law enforcement obtained BlackBerry Global encryption Key

A report published by the VICE News confirmed that the Canadian law enforcement obtained the BlackBerry encryption Key under the investigation Op Clemenza. BlackBerry is probably the first mobile vendor […]

Posted in Cyber Security News | Comments Off on Canadian law enforcement obtained BlackBerry Global encryption Key

British youngster pleading guilty to booter and malware sales

Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the world. Not always crime pays, sometimes the bill can be very salty, […]

Posted in Cyber Security News | Comments Off on British youngster pleading guilty to booter and malware sales

Security experts shut down the dreaded Mumblehard botnet

Researchers and law enforcement in a joint effort shut down the Mumblehard botnet composed of more than 4000 Linux machines. Security experts have shut down a spam botnet, known as Mumblehard, composed of […]

Posted in Cyber Security News | Comments Off on Security experts shut down the dreaded Mumblehard botnet

HTTP/2: What does it change and will it eliminate the need for a CDN?

The world has become accustomed to major technological advances happening every year. It’s taken for granted that the new iPhone’s capabilities will dwarf last year’s model and the new Windows […]

Posted in Cyber Security News | Comments Off on HTTP/2: What does it change and will it eliminate the need for a CDN?

FBI reveals BEC attacks pilfered $2.3bn from US companies

According to a report recently issued by the FBI, cyber criminals have pilfered more than $2.3bn from 17,642 victims since 2013 with BEC attacks. According to the FBI, cyber criminals […]

Posted in Cyber Security News | Comments Off on FBI reveals BEC attacks pilfered $2.3bn from US companies

Why malware like the Samsam ransomware are so dangerous for hospitals?

The FBI issued a confidential urgent “Flash” message to the businesses and organizations about the Samsam Ransomware, why it is so dangerous? It is emergency, every week security experts launch […]

Posted in Cyber Security News | Comments Off on Why malware like the Samsam ransomware are so dangerous for hospitals?

German intelligence Agency BND spied on Netanyahu

The German Intelligence Agency BND has intercepted the Office of the Israeli Prime Minister Benjamin Netanyahu among others. According to the German weekly Der Spiegel, the German intelligence Agency BND […]

Posted in Cyber Security News | Comments Off on German intelligence Agency BND spied on Netanyahu

A NIST guide tells enterprises how to secure email systems

For the first time in a decade, the US National Institute of Standards and Technology (NIST) has updated its secure email guide. The last effort of the NIST Agency in […]

Posted in Cyber Security News | Comments Off on A NIST guide tells enterprises how to secure email systems

Feds request Judge to review the order to reveal TOR Exploit Code

FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeks […]

Posted in Cyber Security News | Comments Off on Feds request Judge to review the order to reveal TOR Exploit Code

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X