id stringlengths 3 10 | content stringlengths 2 25k |
|---|---|
2693_39667 | Yesterday the FBI warned the world that Business Email Scams (BEC) victims are growing, making companies losing money. The law enforcement highlights that frauds use to start with crooks spoofing communications from high management and executives and deceive them to authorize international wire transfers., The numbers ... |
6412_69925 | On February 28, 2018, the code hosting website GitHub was hit by the largest-ever DDoS attack that peaked at 1.3Tbps. The powerful attack was abusing the memcached protocol to power so-called memcached DDoS attacks., Memcached is a free and open source, high-performance, distributed memory caching system designed to sp... |
1829_32274 | Security experts at Symantec have discovered on December 15 a malicious campaign for distributing of a new strain of the notorious Carberp Trojan., The continuous evolution of Carberp, exactly like other popular malware inclusing the Zeus Trojan , was made possible by the availability in underground of its source code ... |
502_12525 | The new is very curious and represents the demonstration that cyber threats could not be analyzed separately, security need a global approach, we cannot distinguish between cybercrime and cyber warfare but we must be focused on the cyber menaces, their effects and the risks connected to adoption of not appropriate secu... |
2234_36409 | I confess that I’m curious about some news, but at the same time I’m worried about the “penetration” of technology in our lives. This is the case of a security researcher that used an NFC chip implant in his hand to demonstrate that it is possible to exploit Android devices and avoid to be detected by common body scan... |
2547_38683 | “The sophistication of this attack far surpasses anything we have seen to date from any state actors,” said Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command. , “To use a military analogy, the level of sophistication of this attack is like comparing a Worl... |
3869_48286 | Following the recent data breaches suffered by IT giants (e.g. MySpace, LinkedIn, Twitter) security experts are inviting users to avoid sharing login credentials on multiple websites and to enable two-factor authentication (2FA) when it is available., Is Two-factor authentication the solution for any kind of hacks?, Of... |
562_13640 | Security worldwide community is alarmed by the explosion of number of cyber threats that are becoming even more sophisticated and are exploring new channel to infect a larger number of machines for various purposes, from cyber espionage to the realization of complex fraud., Antivirus company AVG has published an intere... |
1128_23849 | Extrotion is becoming a worrying inclination in the cyber criminal ecosystem, the number of targeted attacks that request money in change of a suspension of the hostilities and to give back to the victims the abused resources is increasing in significant way. Ransomware and DDoS attacks are the most common forms of att... |
866_20178 | Craig reverse engineered the D-Link Backdoor, discovering that if attacker browser user agent string is xmlset_roodkcableoj28840ybtide, he can access the web interface of the D-Link device bypassing authentication procedure and view/change the device settings., Reading the string xmlset_roodkcableoj28840ybtide backward... |
5994_66012 | According to Li Fengpei, a security researcher with Qihoo 360 Netlab, the publication of the proof-of-concept (PoC) exploit code in a public vulnerabilities database is the root cause of the increase of activity associated with the Mirai botnet., After the publication of the PoC exploit code on October 31, the experts ... |
7073_75523 | Security experts from Kaspersky Labs have spotted a sophisticated strain of banking malware dubbed Dark Tequila that was used to target customers of several Mexican financial institutions., According to the researchers, the complex Dark Tequila malware went undetected since at least 2013., Dark Tequila is a multistage ... |
7094_75699 | The CVE-2018-11776 vulnerability affects Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and potentially unsupported versions of the popular Java framework., “Possible Remote Code Execution when using results with no namespace and in same time, its upper action(s) have no or wildcard namespace. Same possibility w... |
4664_54731 | The Turkish authorities are investigating more than 10000 individuals over online terror activities. The suspects are accused of being responsible for the sharing of material and post against government officials., According to the Interior Ministry, the inquiries are part of the “fight against terrorism, which continu... |
5533_61558 | Are you a fan of ‘Game of Thrones’ series? There is a news for you, hackers claim to have stolen 1.5 terabytes of data from HBO, including information on the current season of Game of Thrones and a script that is reportedly for the upcoming fourth episode of Game of Thrones Season 7., The hackers notified the security ... |
736_17641 | In the last months security firms have observed an increase in criminal activities that exploited Android OS supported by the proactive evolution of the offerings in the underground mobile market. Dancho Danchev is considered one of most accredited experts of the criminal underground and its evolution, he described num... |
3082_42411 | Nearly one thousand websites have been seized by law enforcement agencies following the international operation In Our Sites (IOS) VI. The websites were offering for sale counterfeit merchandise online to consumers., The operation was coordinated by the United States Customs and Border Protection with the support of th... |
7572_79311 | Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal, Kindle Edition, Paper Copy, Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter) |
3134_42768 | People believe that the best way to see a film or get a software is downloading from one of the numerous torrent websites online. Probably there is something that you should know., According to a new study conducted by researchers at Digital Citizens Alliance and RiskIQ, almost one-third of the 800 torrent sites served... |
923_20896 | Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and published by the German magazine Der Spiegel., The US National Security Agency is able to control every data managed by iPhone, the ... |
6838_73740 | The company notified the incident to its users via email and asked them to change their passwords, affected users’ passwords have been reset., FlightRadar24 promptly reported the incident to the Swedish Data Protection Authority in order to comply with the EU’s General Data Protection Regulation (GDPR)., According to F... |
4329_51940 | Do you travel a lot? Probably you have already read about WiFox, it is a legitimate Android/iOS mobile app that includes indications of thousands of airport Wi-Fi networks and their passwords., We have spoken several times about the risks for travelers about the usage of free Airport Wi-Fi hotspots, these networks repr... |
2898_41177 | The threat landscape today is one that grows in depth and sophistication on a daily basis; however, the prevalence and effectiveness of top exploit kits found to be very active in-the-wild cannot be denied. The Angler Exploit Kit’s inner operations were recently publicly-disclosed in one of my earlier posts, revealing ... |
3601_46202 | We have discussed several times about Deep Web and Dark Web, discussing the reason why the hidden part of the web is even more dangerous., However the darknets aren’t a prerogative of criminal organizations, a good portion of the content it host is legal as demonstrated by a recent global survey commissioned by the Cen... |
4738_55308 | Wednesday the latest version of WordPress 4.7.1 was released by the WordPress Team, it is classified as a security release for all previous versions. According to the release notes, the new version addresses eight security flaws and other 62 bugs., According to the WordPress team, the previous WordPress 4.7 release has... |
7682_80408 | Law enforcement agencies in the US and Europe announced the seizure of the popular xDedic marketplace, an underground market offering for sale access to compromised systems and personally identifiable information., “On 24 January, the U.S. Prosecutor’s Office for the Middle District of Florida, the FBI and the Internal... |
1737_31190 | The Wireless Aerial Surveillance Platform is a small DIY drone that has the capability to crack Wi-Fi passwords, eavesdropping on Wi-Fi passwords, eavesdropping on cell phone calls and read text messages. The former Air Force member, Mike Tassey and Rich Perkins, which designed the drone, explained that the Wireless Ae... |
3252_43558 | Vectra Threat Labs, part of Vectra Networks has invested time testing some IoT solutions available in the market, and one of the most interesting products its always the Wi-Fi security web cameras. According to experts from Vectra Threat Labs, web cameras, designed to improve the physical security, can be hacked and re... |
3929_48784 | OurMine is a hacking collective that is scaring IT giants, the list of victims is very long and include names like Mark Zuckerberg, Twitter co-founder Evan Williams, David Guetta Daniel Ek, former Twitter CEO Dick Costolo, the CEO and founder of Spotify, and many others., The last victim in order of time is the CEO of ... |
224_5769 | The UK’s companies 123-reg, the biggest domain provider, was hit this week by a “massive” DDoS attack that caused interruption of the services provided., The company hosts three million domain names and more than 1.4 million sites. According a press published on the company web site, later removed, the attack came fro... |
3306_43970 | The group of experts at Palo Alto Networks Unit 42 have uncovered a new cyber espionage operation conducted by the Chinese AT Codoso (aka C0d0so0 or Sunshop Group)., The Codoso hacking crew has been around since at least 2010 and targeted organizations in different industries, including the defense, energy, finance, g... |
2273_36715 | Skynet is a real system designed by the NSA for online monitoring through metadata analysis, this is the last revelation made by the journalist Glenn Greenwald through the website The Intercept., The Intercept revealed the existence of a secret program called Skynet, a name that’s become popular due to the Terminator M... |
4631_54511 | The security expert Chris Evans has disclosed a zero-day exploit for Ubuntu and Fedora distributions. The flaw is a full drive-by download exploit that may impact also other Linux distributions., The researcher successfully the full zero-day drive-by exploit against Fedora 25 + Google Chrome and Ubuntu 16.04 LTS, and r... |
1418_27693 | Just after the incident occurred to the Malaysian Airlines Flight MH370 a spear phishing attack targeted 30 government officials and bad actors have stolen classified documents relating to the missing Flight MH370., “The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and... |
3434_44876 | Experts in the aviation industry are spending a significant effort in the attempt of improving cyber security. The news that I’m going to tell you has something of incredible., The American journalist and author Steven Petrow, who is now writing for USA Today explained that he was contacted by a fellow passenger on an ... |
3859_48203 | GLOBAL INTELLIGENCE INSIGHT, Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing will deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism., Data comes not just from open sources but also from material not readily available and is gathered b... |
752_17945 | ENISA published a new report titled ENISA Threat Landscape Mid year 2013 that provides an interesting update for the list of top cyber threats., The scope of the ENISA Threat Landscape Mid year 2013 is to give an overview on the trends for cyber threats to give possibility to improve our assessment capabilities accordi... |
812_19322 | , Web Intelligence analysis alerts on early signs of an Anonymous cyber campaign dubbed OpNSA that as usual will address with DDoS attack principal US Government websites. Security experts don’t exclude the possibility that the group will also target subcontractors to gather information for successive attacks within O... |
1775_31638 | A serious security vulnerability affects the default web browser of the Android OS lower than 4.4, according the data provided by Google official dashboard nearly the 66% of Android devices is impacted. The security flaw allows an attacker to bypass the Same Origin Policy (SOP)., , The Android Same Origin Policy (SOP) ... |
1525_28930 | The EU’s chief criminal intelligence agency made a disconcerting revelation, the threat of “online murder” is set to rise. It isn’t a science movie trailer, but the finding that cyber criminals increasingly targeting victims with internet technology that could cause “injury and possible deaths” by hacking critical safe... |
934_21049 | VSAT terminals (very-small-aperture terminal) used for satellite communications are vulnerable to external cyber attacks, the discovery was made by security researchers at IntelCrawler, a Los-Angeles based cyber intelligence company., The VSAT vulnerability appears serious and have a significant impact on distributed c... |
814_19368 | Cyberbullying is the use of the Internet and any other technology to harm or harass other people, in a deliberate, repeated, and hostile manner. Unfortunately this phenomena are in constant increase, in many cases the repercussion are serious especially for youngsters, due this reason legislation and awareness campaig... |
2401_37675 | After Security expert and hacker, Chris Roberts announced the possibility of hacking into aircrafts, more tension about the security of autonomous and connected vehicles has come to the fore. These cars are expected to be on the roads by 2020 and even earlier. A lot of manufacturers such as Volvo have been working on t... |
7106_75762 | In December 2104, researchers at Check Point Software Technologies discovered the Misfortune Cookie vulnerability, a flaw that was affecting millions of devices running an embedded web server called RomPager, the vulnerability could be exploited by an attacker to run a man-in-the-middle attack on traffic going to and f... |
315_8153 | The cyberspace has no peace, every time a malware or a botnet is detected and neutralized a new cyber threat is coming, this time a new agent scare security experts, its name is Shamoon and is able to destroy files on victim’s PC and overwrite the master boot record of its disks., In different way respect all the malwa... |
4673_54799 | Lithuania blames Russia for cyber attacks that have hit government networks over the last two years. According to the Reuters, the head of cyber security Rimtautas Cerniauskas confirmed the discovery of at least three Russian spyware on government computers since 2015., Lithuanian officials targeted by the alleged Russ... |
1399_27547 | Researchers from ERNW GMBH revealed that misconfigurations and vulnerabilities in Cisco’s EnergyWise suite could be exploited by attackers to cause huge blackouts. The team has presented the results of their study during the last Black Hat conference in Las Vegas, they discussed about possible abuse of the protocol us... |
629_15205 | Which is the commercial value of a hacked email account in the underground?, Brian Krebs has recently published a valuable post on commercial value for a hacked email account, common people hardly covers the economic model behind the theft of these commodities. During one of my last participation to a TV show the jour... |
7670_80297 | During the last weeks, the Cybaze-Yoroi ZLab researchers identified infection attempts aimed to install RAT malware directed to the naval industry sector. The malicious email messages contained a particular Adwind/JRat variant delivered via several methods tailored to lure the target company. , In the recent past, simi... |
6199_67836 | In March 2014, Facebook founder Mark Zuckerberg announced the acquisition of Oculus VR and included the handsets produced by the company to its bug bounty program., White hat hackers discovered several vulnerabilities in Oculus platform since, including the ones addressed now by Facebook., The flaws were reported in Oc... |
1302_26233 | Facebook is the subject of a heated debate for a psychological experiment the company has conducted on nearly 700,000 people without their knowledge. The Facebook experiment was carried out in 2012 and was related to the manipulation of content on users’ newsfeeds to analyze the effect on the user’s sentiment., The Fac... |
808_19259 | The image Uploader will check for the uploaded files to accept certain image extensions only, like PNG, JPG while other extensions won’t get uploaded., The Unrestricted File Upload Vulnerability allowed the expert to bypass this inadequate security check and to successfully upload .htaccess and .php files to twimg.com ... |
6305_68845 | The US authorities have taken down a global cybercrime organization, the Justice Department announced indictments for 36 people charged with being part of a crime ring specialized in stealing and selling credit card and personal identity data., According to the DoJ, the activities of the ring tracked as ‘Infraud Organi... |
335_8506 | , Business slogans on a road and street signs |
5778_63826 | Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by enterprises., The company Appthority has published an interesting report that reveals which mobile apps, both Android and iOS, are most frequently blacklisted by enterprise... |
6211_67957 | In December 2017, a new malicious code dubbed Triton malware (aka Trisis) was discovered by researchers at FireEye, it was specifically designed to target industrial control systems (ICS) system., Security experts at CyberX who analyzed samples of the malware provided further details on the attack, revealing that Trit... |
1646_30294 | The XDA developers forum has already reported the security issue to the Microsoft, as explained by the operators of the forum the vulnerability could give higher privileges to the attackers if tried using a First Party Application, rather a third party app., Pierluigi Paganini, (Security Affairs – Windows Phone 8.1, m... |
7162_76146 | Researchers at Trend Micro have detected a new ransomware family, dubbed PyLocky, that was used in attacks between July and August, the malware was posing as the Locky ransomware using its ransom note., PyLocky is written in Python and it is packaged with the PyInstaller tool that is normally used to freeze Python prog... |
4455_53041 | Cisco has issued patches for two critical vulnerabilities affecting several products, including Cisco 900 Series Routers and Cisco Prime Home server and cloud-based network management platform., The company published two security advisories to report the issues to his customers. One of the security advisories warns ser... |
388_9956 | Last year I wrote about a new powerful surveillance system that Russian government committed to private business to implement a complex monitoring system, officially to prevent terrorist attacks against Russia., The day is come, today the system has been deployed officially to prevent on-line pedophilia but it obvious ... |
7460_78373 | The Wall Street Journal reported that the US Government is urging its allies to exclude Huawei from critical infrastructure and 5G architectures., The United States is highlighting the risks for national security in case of adoption of Huawei equipment and is inviting internet providers and telco operators in allied co... |
5173_58699 | Another day, another data breach, this time the victim is the Travel Tech Giant Sabre that in a SEC filing confirmed it is “investigating an incident involving unauthorized access to payment information contained in a subset of hotel reservations processed through the Sabre Hospitality Solutions SynXis Central Reservat... |
4972_57067 | Security experts from Trend Micro discovered a new family of Linux malware that is targeting products from surveillance technology company AVTech exploiting a CGI vulnerability that was disclosed in 2016., According to Trend Micro, the flaw was reported to AVTech in October 2016, but the vendor has never responded., “T... |
3625_46400 | Last year, the security director of a US lottery was discovered hacking the mechanism of the extraction in order to predict the winning tickets., According to new details revealed by The Des Moines Register, the lottery boss won roughly $16.5 million in six years by hacking the random number generator., The Lottery sec... |
4912_56645 | It was mid-2016 when Apple’s design lab internal development servers was infected by a malware that was masquerading as a fake firmware patch., In response to the security incident, Apple purged its data centers of servers built by Supermicro, including returning recently purchased systems., “In early 2016, Apple disco... |
5727_63270 | The U.S. Securities and Exchange Commission (SEC) announced that cyber criminals had previously breached its database of corporate announcements in 2016 and likely they have used it for insider trading., On Wednesday, the SEC Chairman Jay Clayton released a “statement on cybersecurity” that reported a 2016 security bre... |
4281_51555 | Google has finally announced a new OAuth 2.0 token revocation according to its security policy, the company will roll out the change starting on Oct. 5., The change to the Google security policy was announced last year by Google, the company explained that OAuth 2.0 tokens would be revoked when a user’s password was ch... |
4257_51341 | The security researchers Markus Vervier and Jean-Philippe Aumasson have discovered multiple vulnerabilities in the Android version of the secure messaging application Signal that can be exploited by a remote attacker to alter attachments and cause the app to crash., Signal is a free and open-source encrypted voice call... |
1550_29239 | It’s up to DropBox, an archive of nearly 7 million Dropbox login credentials has been published on PasteBin. A guest account post on Pastebin four different documents, all claiming to be part of “the massive hack of 7,000,000 accounts”. The author also anticipated that there are “More to come” if punters “keep showing ... |
7533_78946 | The U.S. Department of Defense Inspector General published a report this week that revealed that lack of adequate cybersecurity for the protection of the United States’ ballistic missile defense systems (BMDS)., Ballistic missile defense systems are crucial components of the US Defense infrastructure, they aim to prote... |
958_21431 | While US are facing with a series of clamorous data breached against principal retailers, in South Korea an employee of personal credit ratings firm Korea Credit Bureau (KCB) has been arrested accused of one of the greatest data breach., The man was accused of stealing the data from customers of three credit card firms... |
1905_33143 | Sony Pictures Entertainment might have been hacked by Russian blackhat hackers and not the Democratic People Republic of Korea. This news emerged this week after renowned Russian blackhat YamaTough revealed that a group of Russian hackers had shown him evidence that they still, as of January 2015, have access to Sony’s... |
6621_71846 | European law enforcement agencies coordinated by Europol conducted an unprecedented multinational cyber operation against the Islamic State’propaganda machine., Authorities have “punched a big hole” in Islamic State’s propaganda machine, they targeted news agencies and radio stations in a two-day takedown operation., “... |
4085_49976 | 15 million Iranian Telegram accounts have been compromised, users have reportedly had their personal information exposed (phone number, Telegram ID)., The security researchers Collin Anderson and Claudio Guarnieri have investigated the case, more than a dozen Telegram accounts were compromised and 15 million Iranian us... |
2777_40228 | Many people get confused over the terminology of online threats, such as Targeted Attacks and APTs (which stands short for Advanced Persistent Threats). However, when it comes to comparing these two, there is nothing that should confuse you. On the contrary, the differences are substantial and this is what we are going... |
4191_50795 | Saudi government facilities have been targeted by major cyber attacks, in response, the Government has convened a group of cyber experts to examine the events., According to the Saudi Press Agency, Saudi cyber experts held urgent talks on Tuesday after the cyber attack “in recent weeks targeted government institutions ... |
5148_58476 | The popular Kali Linux distribution has a new weapon in its hacking arsenal, it can use cloud GPUs for password cracking., Kali Linux is the most popular distribution in the hacking community, it is a Debian-based distro that includes numerous hacking and forensics tools., , This week, the Kali development team has inc... |
6905_74236 | Experts from Kaspersky Labs have discovered a new strain of the Rakhni ransomware family that could infect systems with either a ransomware or a cryptocurrency miner depending upon their configurations., “Way back in 2013 our malware analysts spotted the first malicious samples related to the Trojan-Ransom.Win32.Rakhni... |
5575_61917 | Sergey Neverov, a 51-year-old man, has been arrested, on Saturday 5 August, by Ukrainian Cyber Police on accusations of distributing a version of the NotPetya(Petya.A) ransomware after the initial attack event of late June., The man has two sons and he is resident in the southern city of Nikopol in Ukraine, he is a You... |
3484_45273 | Ransomware continues to be among most insidious threats in this first part of the year, security researcher have recently observed a spike in the number of Locky ransomware infections., The experts from Trustwave security firm highlighted the worrying intensification around this threat., The security researchers observ... |
4811_55868 | The dark web is the right place where to buy and sell corporate secrets, experts at the risk management firm RedOwl and Israeli threat intelligence firm IntSights made an interesting research titled “Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web.”, The research is disconcerting, hackers are... |
7381_77735 | The flaws were discovered by researchers Carlo Meijer and Bernard van Gastel at Radboud University in the Netherlands, the duo discovered that it is possible to bypass password-based authentication to access to encrypted data stored on the drives., Experts pointed out that encryption keys used to protect data are not d... |
4586_54159 | A couple of weeks ago, an unknown attacker hacked the computer systems of the San Francisco’s Municipal railway giving riders a free ride all day on Saturday. Now the same hacker seems to have been hacked. According to the popular investigator Brian Krebs, an individual took over the email account of one of the San Fra... |
310_8073 | , Ron Kelson,, Pierluigi Paganini, Fabian Martin,, David Pace,, Benjamin Gittins, , Many people are inclined to leave the responsibility for personal banking security entirely with the banks. However, this is not a good strategy for many reasons, including:, In this article we begin by introducing various mobile banki... |
4724_55209 | The security researcher Chris Vickery discovered a Sanrio database that was misconfigured and exposed to the public in 2015., On December 2015, Vickery reported the discovery to Databreaches.net and Salted Hash., According to Vickery not only the primary database sanriotown.com was affected, the fan portals of the foll... |
7141_76002 | The U.K. National Crime Agency (NCA) announced the arrest of the 19-year-old George Duke-Cohan from Hertfordshire that was involved in the ProtonMail DDoS attack., The teenager, aka “7R1D3N7,” “DoubleParallax” and “optcz1,”was arrested on August 31 and is still in custody after he pleaded guilty to three counts of maki... |
5222_59130 | While critical infrastructure worldwide and private organizations were ridiculed by the WannaCry attack, WikiLeaks released a new batch of CIA documents from the Vault 7 leaks., The new dump included the documentation related to two CIA frameworks used to create custom malware for Microsoft Windows platform., The two f... |
3013_41950 | Ransomware is probably the most popular category of malicious code in this period, this week we have discussed a malicious code that infected the UK Parliament, an off-line ransomware and a Linux.Encoder1 ransomware revealing the decryption key., News of the day is that a new Ransomware-as-a-service surfaces from the c... |
5804_64137 | Microsoft’s October Patch Tuesday addresses three critical security vulnerabilities in the Windows DNS client in Windows 8, Windows 10, and Windows Server 2012 and 2016., The vulnerabilities affect the Microsoft’s implementation of one of the data record features used in the secure Domain Name System protocol, DNSSEC.,... |
7290_77114 | Richard Bauer (28), an ex-NASA contractor has pleaded guilty for a cyberstalking, the man allegedly threatened to publish nude pictures of the women unless they sent him other explicit pictures., Richard Bauer of Los Angeles, who worked at NASA’s Armstrong Flight Research Center in Southern California, pleaded guilty f... |
3006_41905 | Q1 First of all, the Federal Aviation Administration gave a very compressed timeline. They’re asking a expert panel task force to make registration guideline recommendations by November 20 and these recommendations implemented by mid-December, so that 1 million done sold during this year’s holiday season would all be r... |
6541_71161 | The best news of the week with Security Affairs., Let me inform you that my new book, “Digging in the Deep Web” is online, Kindle Edition, Paper Copy, , Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter) |
1802_31932 | Malware authors have demonstrated a great inventiveness using any kind of platform and technique to control their malicious code. Security experts have detected botnet controlled via Gmail drafts, Evernote or any other platform that could allow attackers to hide malicious traffic., Last discovery is the use of the Past... |
5966_65727 | The best news of the week with Security Affairs., Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter) |
1048_22727 | Car hacking is a topic increasingly discussed by the media and within the security community, it is crucial to understand the level if security offered by vehicles due the effects of the massive introduction of technology in our vehicles is car hacking. The term refers to the possibility that an attacker can gain compl... |
4120_50222 | The researchers made a reverse engineering of a component inside a Volkswagen’s network and identified and extracted a cryptographic key that is shared among millions of Volkswagen cars. The scientists did not reveal the exact procedure to extract the keys avoiding crooks to exploit the same technique., The knowledge o... |
3954_48968 | The best news of the week with Security Affairs., First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog
, mc4wp_form id=”42321″, , Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter) |
5167_58646 | The notorious hacker group OurMine made the headlines once again, this time the victim it the Unity Game Engine forum., The group has defaced and hacked the Unity forum over the weekend and used its data to send out emails to registered users via a built-in mass email feature., , The messages inform the Unity forum use... |
3956_48972 | A few days ago I reported the story of the security expert Benjamin Tedesco that has spotted an ATM skimmer during his vacation in Vienna. The ATM skimmer was quite impossible to detect to common people and unfortunately this kind of crimes is becoming frequent., Security experts are observing an increase in the number... |
1906_33153 | Security experts from Invincea are investigating on a new Ransomware campaign originated in Russia that presented many interesting characteristics. The researchers discovered that the attacks started by using file-less infections then moved to the exploitation of zero-day vulnerabilities in Adobe’s Flash Player., The t... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.