Monthly Archives: June 2018
Apophis Squad hacker group is allegedly responsible for the DDoS attack against ProtonMail
A massive DDoS attack hit encrypted email provider ProtonMail, experts believe it was powered by Russian hackers. On Wednesday morning, ProtonMail informed customers that its systems were under attack that was […]
Recently discovered RANCOR cyber espionage group behind attacks in South East Asia
Security researchers at Palo Alto Networks have uncovered a new cyber espionage group tracked as RANCOR that has been targeting entities in South East Asia. According to the experts, the RANCOR APT […]
CSE Malware ZLab – A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy
Malware researchers from CSE Cybsec ZLab discovered a missed link between the Necurs Botnet and a variant of the Ursnif trojan that recently hit Italy. Starting from 6th June, a new version of […]
China Tick APT group targeting air-gapped systems in Asia
Palo Alto Networks experts uncovered a new operation conducted by the cyber espionage group known as Tick APT that has been targeting a secure USB drive built by a South Korean […]
The IoT makes almost anything possible, but it also makes us vulnerable
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices […]
Magento credit card stealer Reinfector allows reinfect sites with malicious code
Cybercriminals used the ‘credit card stealer reinfector’ to reinfect the websites and continue to steal personal and financial data. Researchers at Sucuri reported crooks are using a very simple evasion technique to reinfect […]
Red Alert 2.0 Android Trojan available for rent in the underground at $500 per Month
According to researchers at Trustwave, the source code of the Red Alert 2.0 Android Trojan is now available for rent on cybercrime underground forums at $500 per month. The experts discovered the latest […]
Shine a Light on App Security
Cybersecurity and protecting the network reside squarely in the corporate IT spotlight, yet there’s a shadow area where it’s time to shine a light: Application security. Too often it’s the […]
Hacking more than 400 Axis camera models by chaining 3 flaws
Researchers from cybersecurity firm VDOO have discovered several vulnerabilities affecting nearly 400 security cameras from Axis Communications. Researchers from cybersecurity firm VDOO have conducted a study on IoT devices and […]
WARNING SIGNS FOR MANAGING CYBER SECURITY
In 1997, the NSA attacked the Department of Defense information infrastructures and attempted to breach their network. The attack was codenamed Operation Eligible Receiver 97 and was intended to test […]
DHS, FBI published a join alert including technical details of Hidden Cobra-linked ‘Typeframe’ Malware
The US DHS and the FBI have published a new joint report that includes technical details of a piece of malware allegedly used by the Hidden Cobra APT. A new joint report […]
China-Linked APT15 is still very active, experts found its new malware tracked as ‘MirageFox’
Following the recent hack of a US Navy contractor security experts found evidence of very recent activity by the China-linked APT group tracked as APT15. The China-linked APT15 group (aka Ke3chang, Mirage, Vixen […]
Europol dismantled the Rex Mundi hacker crew, it arrested another member of the gang
The Europol announced that several French nationals were arrested in the past year on suspicion of being involved with notorious Rex Mundi crime gang. Another success of the Europol made […]
European Parliament decides to ban Kaspersky products because they claim they are malicious
Calls on the EU to perform a comprehensive review of software, IT and communications equipment and infrastructure used in the institutions in order to exclude potentially dangerous programmes and devices, […]
Just Because You’re Paranoid Doesn’t Mean that Some Thing Isn’t Out to Get You
Cybersecurity and the Internet of Things Dr. Lynne Williams, Professor, School of Business at Information Technology, Purdue University Global The Internet of Things [IoT] is not just the next trend […]
InvisiMole Spyware is a powerful malware that went undetected for at least five years
Malware researchers from ESET have spotted a new sophisticated piece of spyware, tracked as InvisiMole, used in targeted attacks in Russia and Ukraine in the last five years. Experts still […]
Are we at a peaceful crossroad or will Cyber War continue, unabated?
We just launched a 150+ page special June edition of our e-Magazine on a very historic day, yesterday, June 12, 2018, when World Leader US President Donald J. Trump and […]
Paladin Cyber Introduces Paladin Browser Protection as Google Chrome Extension, the First-Ever Comprehensive Cyber Protection Toolkit
Free extension keeps hackers out of consumer’s browsers and inboxes to protect private information To download the free Paladin Browser Chrome extension, and for more information please visit: meetpaladin.com/paladin-browser-protection-for-chrome Paladin […]
Crooks used a KilllDisk wiper in an attack against Banco de Chile as diversion for a SWIFT hack
Crooks attempted to hack the SWIFT system at the Banco de Chile and used a disk-wiping malware as a diversion strategy. The intent of the attackers was to sabotage hundreds of […]
HR Software company PageUp victim of a Data Breach, experts fear a domino effect
HR Software Firm PageUp is the last victim of a data breach, the company has 2.6 million active users across over 190 countries. Another day another data breach makes the […]
Iron cybercrime group uses a new Backdoor based on HackingTeam’s RCS surveillance sw
Security experts at security firm Intezer have recently discovered backdoor, associated with the operation of the Iron cybercrime group, that is based on the leaked source code of Remote Control […]
4 Encryption Technologies You Should Use
How are you encrypting data in your organization? The number of users, clients, and organizations who access the internet to share data is growing. As of April 2017, there are […]
The author of the Sigrun Ransomware decrypts Russian victims’ files for free
The author of the Sigrun Ransomware is providing the decryption key to Russian victims for free, others have to pay a ransom of $2,500 worth of Bitcoin or Dash for the […]
North Korea-Linked Covellite APT group stopped targeting organizations in the U.S.
A North Korea-linked APT group, tracked by experts at industrial cybersecurity firm Dragos as Covellite, has stopped targeting US organizations. Anyway, the group, that is believed to be linked to the notorious Lazarus […]
Flaws in Multidots WordPress Plugins expose e-Commerce websites to a broad range of attacks
Researchers at ThreatPress firm discovered security vulnerabilities in ten WordPress plugins developed by Multidots, a company for e-commerce websites. The vulnerable plugins are available on theWordPress.org and implement a set of features […]
US-CERT issued an alert on two malware associated with North Korea-linked APT Hidden Cobra
The Department of Homeland Security (DHS) and the FBI issued a joint Technical alert on two strain on malware, the Joanap backdoor Trojan and Brambul Server Message Block worm, associated with the […]