Monthly Archives: June 2017
Notpetya – The Petya variant used in the massive attack is a wiper disguised by a ransomware
According to the researchers, the Petya variant (NotPetya) used in the massive attack is a wiper disguised by a ransomware. In these hours the massive global attack based on Petya […]
Google Hacker found a new way to bypass Microsoft Windows Defender
The Google Project Zero expert Tavis Ormandy has found a flaw in Windows Defender that allow attackers to bypass the Microsoft anti-virus tool. The popular Google Project Zero hacker Tavis Ormandy has […]
Five Reasons Why You Shouldn’t Miss RSA® Conference 2017 Asia Pacific & Japan
SINGAPORE–(BUSINESS WIRE)–Cybersecurity has been top of mind with WannaCry, the Internet of Things, and new government regulations dominating technology conversations today. “In keeping with the spirit of broadening discussions, changing […]
Company fired an employee, he shut down water utility providers’ networks in 5 cities
A former employee was sentenced to one year and one day in prison for damaging the IT networks of several water utility providers across the US East Coast. Adam Flanagan (42) of […]
32TB of Windows 10 internal builds and portions of core source code leaked online
A massive dump of Microsoft’s confidential Windows 10 internal builds, and the source codes for private software has been leaked online. A huge trove of Microsoft internal Windows operating system […]
TrickBot gang is back with new campaigns targeting Payment Processors and CRM Providers
Threat actors behind the financial trojan TrickBot have been updating its campaigns targeting Payment Processors and CRM Providers. Threat actors behind Banking Trojan TrickBot switched from financial institutions to Payment […]
Stack Clash vulnerability allows an attacker to execute code as root
Stack Clash is a local privilege escalation flaw in Linux, BSD, Solaris and other open source systems that allows an attacker to execute code as root. Linux, BSD, Solaris and other […]
The mighty have fallen: how even the unlikeliest targets are going down to DDoS attacks
Informative sources on distributed denial of service (DDoS) attacks will often include at least one warning that nearly every website on the internet is a potential target. With the current […]
Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software
Journalists and activists in Mexico accused the government of spying on them with the powerful surveillance software Pegasus developed by the NSO Group. Journalists and activists in Mexico accused the […]
NetQuest Enhances Cyber Intelligence Gathering with Industry’s First 100G Coherent Network Visibility Solution
I-9100’s automated visibility and survey capabilities offer superior access to modern 100G optical transport networks for national defense initiatives MOUNT LAUREL, NJ – June 13, 2017 – NetQuest Corporation, a […]
Pinkslipbot banking Trojan exploiting infected machines as control servers
Pinkslipbot banking Trojan is a banking Trojan that uses a complicated multistage proxy for HTTPS-based control server communication. Security researchers at McAfee Labs have spotted a new strain of the Pinkslipbot […]
Buckle Inc. confirmed credit card breach at its stores
An official statement issued by the Buckle Inc. retail confirmed that a point-of-sale malware was discovered on cash registers at its stores. A few hours ago, the popular investigator and […]
Is it Legal to Use a VPN?
Many Internet users opt to use a VPN, or virtual private network, when accessing the Web. These types of services encrypt your data and hide your IP address, which can […]
5 Reasons Why MFT Agents May Be Right For You
In this age of ever-growing security and business needs, finding a balance between secure data and immediate, remote file transfer (which can include the use of cloud environments) is incredibly […]
Israeli Intelligence spotted IS plans for Laptop Bomb
Israeli cyber spies hacked into the operations of Islamic State bombmakers and discovered they were developing a laptop bomb to hit commercial air crafts, Israeli government spies hacked into the […]
Platinum hackers leverages Intel Active Management tools to bypass Windows firewall
The PLATINUM hacker group has developed a system leveraging Intel Active Management Technology (AMT) to bypass the Windows firewall. Microsoft is warning users of a new attack that leverage Intel’s […]
SECURE SWISS DATA LAUNCHES FULLY ENCRYPTED MOBILE APPLICATION
Zurich, Switzerland: Today, Secure Swiss Data, a company that specializes in protecting corporate data and individual privacy through their encrypted email and file sharing services, is launching a fully encrypted […]
INTERPOL World 2017 to Showcase the Latest Innovations for Future Security Challenges
SINGAPORE, 8 June 2017 – The stage is set for INTERPOL World 2017 as it readies to welcome over 10,000 law enforcement agencies, government bodies, academia, solution providers, security professionals, […]
NSA top-secret report details Russian cyber operations days before 2016 election
Russian intelligence powered a cyber attack on at least one US voting software supplier and sent spear-phishing emails to election officials just days before Election The online news outlet The […]
Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign
Experts killed tens of thousands of subdomains used by crooks to host the RIG Exploit Kit that were set up with a domain shadowing campaign. GoDaddy and RSA Security, with […]
Insecure Hadoop Distributed File System installs 5 PB of Data
According to Shodan search, unprotected Hadoop Distributed File System installations expose 5 PB of data. Hadoop servers that are not securely configured expose vast amounts of data, according to an […]