Monthly Archives: January 2017
Latest Dridex Trojan variant uses new tactic to bypass Windows UAC
A new variant of the Dridex Trojan recently observed is leveraging a new tactic to bypass the UAC (User Account Control). Researchers at the security firm Flashpoint have discovered a […]
Uber pays $9,000 bug bounty payoff for partner firm’s vulnerability
A security expert discovered a flaw in a ransomware protection service that opened Uber service, and many others, to cyber attacks. The Russian penetration tester Vladimir Ivanov from the security […]
Sage 2.0 ransomware is spreading and demands a $2,000 ransom
A newly observed spam campaign is spreading a ransomware variant known as Sage 2.0 that is demanding a $2,000 ransom for the decryption key. Sage 2.0 is a new ransomware […]
A flaw in the Cisco WebEx Extension allows Remote Code Execution
Tavis Ormandy, a security expert at Google Project Zero, has discovered a critical remote code execution vulnerability in the Cisco WebEx browser extension. Google Project Zero researcher Tavis Ormandy has discovered […]
Western Union agreed to pay $586 Million to settle fraud charges
The money transfer leader company Western Union has agreed to forfeit $586 million to settle fraud charges and admitted it facilitated scammers. Money transfer leader company Western Union has admitted to facilitating wire fraud and it has […]
Necurs botnet is back and has started delivering Locky ransomware
Cisco Security Team has noticed traces of traffic from the dormant Necurs botnet and they are warning of a possible new massive ransomware spam campaign. Security researchers at Cisco Security […]
The Carbanak gang is with a new modus operandi, Google services as C&C
The infamous Carbanak cybercrime gang is back and is leveraging Google services for command-and-control of its malicious codes. The dreaded Carbanak cybercrime gang is back and is adopting a new tactic for […]
How to remain anonymous online
“Someone’s watching you!” – it’s more true today than it’s ever been, when your every movement isn’t being tracked by the millions of CCTV cameras in the UK (even considering […]
New campaign leverages RIG Exploit kit to deliver the Cerber Ransomware
Experts from Heimdal Security warned of a spike in cyber attacks leveraging the popular RIG Exploit kit to deliver the Cerber Ransomware. The RIG exploit kit is even more popular in the […]
Shadow Brokers exits releasing another arsenal of tools to hack Windows
The ShadowBrokers hacking group that broke into the NSA arsenal and stole its hacking tools is signing off leaving a gift to the security community. The mysterious hacking group calling […]
A Second variant of Shamoon 2 targets virtualization products
A second variant of the Shamoon 2 malware was discovered by researchers at Palo Alto Networks, this threat also targets virtualization products. A new strain of the Shamoon 2 malware was spotted […]
ESEA data breach, 1.5 million gamers’ records leaked
The E-Sports Entertainment Association (ESEA), one of the largest competitive video gaming communities was hacked, 1.5 million players have been affected. Bad news for gamers, the E-Sports Entertainment Association (ESEA), […]
Yahoo! Data Breach Didn’t Need to Happen…Here’s Why…
I remember meeting Tim Koogle in one of the ‘ten plague’ conference rooms in the early days of Yahoo! Tim was the founding CEO at the time. I thought it […]
French Defense Minister Le Drian warns of cyber attacks during upcoming elections
Defense Minister Le Drian comments expressed concerns about cyber attacks against defense systems and warns of hacking campaigns on the upcoming elections. According to the Defence Minister Jean-Yves Le Drian […]
Hacker held open MongoDB databases for ransom
A mysterious hacker is breaking into unprotected MongoDB databases, stealing their content, and asking for a ransom to return the data. Co-founder of the GDI Foundation Victor Gevers is warning of poor […]
Changing travelers flight bookings is way too easy for hackers
Changing travelers flight bookings is too easy. Absolutely astounding the Karsten Nohl research on the insecurity of traveler flight information. The current travel booking systems is deeply insecure, it lacks […]
New variant of the Sundown exploit kit leverages steganography to hide malicious code
A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security experts from Trend Micro have spotted a new version of […]