id stringlengths 3 10 | content stringlengths 2 25k |
|---|---|
1947_33637 | Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware., According to a new report from Kaspersky Lab, this group, dubbed the Equation Group, combined sophisticated and complex Tactics, Techniques, and Pr... |
968_21589 | Researchers at Symantec antivirus firm have discovered a malicious code that is able to infect Android mobile device with a banking malware during synchronization. The Android malware that was designed to hit Windows user could compromise user’s Smartphone during file transfer, device syncing and backup management oper... |
937_21109 | On January 2nd one of the eight computers in the control room at Monju Nuclear Power Plant was compromised. An IT administrator has discovered that the system in the reactor control room had been accessed over 30 times in the last five days after an employee updated a free application on one of the machines in the plan... |
4670_54777 | , You are a talented hacker that is very active online, could you tell me more about you. Could you tell me which his your technical background and when you started hacking?, I was beginning with programming plugins on the game @Minecraft then I started writing Python scripts and doing C# and C++ I was set upping in 20... |
6237_68205 | libcurl is a free and easy-to-use client-side URL transfer library, it builds and works identically on numerous platforms., According to a security advisory, libcurl is affected by a couple of issues, one of them might cause the leakage of authentication data to third parties., The problem is related to the way it hand... |
4650_54641 | The hacker Kapustkiy continues its string of hack, today he announced a news data breach, the victim is the Costa Rica Embassy in China., Kapustkiy accessed a database containing 280 login credentials, but just published online 50 of them as a proof of the attack. Just after the attack, the Costa Rica Embassy in China,... |
2253_36554 | The best way to protect data from prying eyes is to destroy them, this is the thought of criminals when law enforcement is investigating on them., The best option for crooks it to completely wipe their electronic equipment, or make them not accessible, before law enforcement seize them to conduct a forensic analysis. T... |
5761_63609 | The Electronic Frontier Foundation (EFF) confirmed that a sophisticated spear-phishing campaign targeted the employees of Internet freedom NGOs “Free Press” and “Fight for the Future”, The EFF revealed that it is aware at least 70 attempts to steal the credentials of net neutrality activists between July 7 and August 8... |
3227_43389 | Nearly 320,000 of the TV cable and Internet service provider Time Warner Cable customers urge to change their passwords for the email account. The measure has been requested by the company in response to alleged unauthorized accesses to the accounts., , The announcement is the response of the company to the information... |
2567_38811 | In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was attacked and various important information was leaked., The attack on the company named “HackingTeam” forced Netragard (a company that buys and sells exp... |
6668_72298 | Are you using the Python module ‘SSH Decorator’? You need to check the version number, because newer versions include a backdoor., The library was developed to handle SSH connections from Python code., Early this week, a developer noticed that multiple backdoored versions of the SSH Decorate module, the malicious code ... |
1410_27624 | Symantec recently issued the “Threats to virtual environments” report to analyze principal menace for virtualized environments. The report is very actually and considers the rapid diffusion of the virtualization paradigm within enterprises., According to Forrester Research more than 70 percent of organizations are plan... |
3485_45279 | Cisco just patched critical vulnerabilities in its cable modems, residential gateways and security appliances., The security updates released this week fix serious flaws in Cisco residential reported by Kyle Lovett, and Chris Watts from Tech Analysis firm., Kyle Lovett has found an information disclosure vulnerability ... |
4267_51434 | Security experts from the cyber threat intelligence firm Blueliv have conducted a technical investigation on the banking Trojan Vawtrak v2 and activities of the cybercriminal groups behind the threat., Vawtrak is a threat that has been in the wild since 2014 when experts at Trend Micro spotted the threat that was targe... |
1367_27129 | Bad actors use digital certificates to eavesdrop on SSL/TLS traffic. Usually these attacks exploit the lack of strict controls by client applications when a server presents them with an SSL/TLS certificate signed by a trusted but unexpected Certification Authority., SSL certificates are the privileged mechanism for ens... |
7566_79239 | Group-IB Brand Protection team discovered a total of around 4,000 websites illegally selling alcohol. Criminals create entire networks from the “mirror–websites” of their online alcohol stores; if one site is blocked, they swiftly migrate to a backup resource., The intoxicating Internet, Active regulatory measures take... |
4677_54830 | KillDisk is a malware that has been used in attacks against industrial control systems (ICS), it was developed to wipe the hard drives of the infected machine in order to make it inoperable., The new variant is able to encrypt the file with AES algorithm, the malware uses a unique key for each target and encrypt it wit... |
6542_71164 | The malware is still under development and appears to have originated in Hong Kong, it has a smaller system footprint compared with similar threats., “Netskope Threat Research Labs has discovered a new ATM malware, “ATMJackpot.” The malware seems to have originated from Hong Kong and has a time stamp on the binary as 2... |
6867_73953 | The Thanatos ransomware first appeared in the threat landscape in February when it was discovered by researchers at the MalwareHunterTeam., The experts from Talos believe the malware is being actively developed, it was being distributed as attachments to chat messages sent via Discord., When the malware encrypts files ... |
7319_77284 | Monitoring of social media platforms is a crucial activity for intelligence agencies, almost any government is working to gather intelligence for these systems., According to the Haaretz, the Israel Defense Forces has bid to obtain spying systems that will allow monitoring of the private messages of social media users.... |
5626_62335 | Ransomware continues to represent a serious threat to users and organizations., Unfortunately, it is easy for crooks arranging their own ransomware campaign by using numerous RaaS services offered online., Recently researchers at Symantec discovered a new Android ransomware-as-a-service (RaaS) kit that allows creating ... |
4288_51610 | , You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about you. , Sure, I’ve been working with OPDdosISIS mainly against ISIS, taking sites down (2013-2015) also Im working on OPAnonHQ, which is against the huge amount of profit they make with the anonymous idea... |
4518_53600 | Surveillance systems produced by Moxa SoftCMS and IP cameras manufactured by Vanderbilt are affected by serious vulnerabilities that can be exploited by remote attackers to obtain full control of flawed systems., The ICS-CERT has published a security advisory to describe three serious vulnerabilities in the central man... |
2560_38765 | According to a poll done by Morning Consult firm, cyber attacks are just behind terrorism attacks on the list of biggest threats to the US, it has been estimated that the insurance industry could face losses of about $21 billion. That poll was conducted in the period between May 29 and May 31 by interviewing a national... |
5224_59149 | The APT32 group, also known as OceanLotus Group, has been active since at least 2013, according to the experts it is a state-sponsored hacking group., The hackers targeting organizations across multiple industries and have also targeted foreign governments, dissidents, and journalists., Since at least 2014, experts at ... |
3124_42706 | Security experts at Zscaler discovered a malware-based campaign relying on a new strain of Spy Banker banking malware., Spy Banker is an old threat, it was first detected in 2009, the new variant spreads over social media, primary through Facebook, and relies on social engineering to trick users into clicking shortened... |
566_13715 | Security firm Group-IB has detected a new variant of malware that targets the popular Russian stock-trading platform QUIK (Quik Broker, Quik Dealer) provided by Russian software developers ARQA Technologies. The malware has been used during various attacks staring in last November (2012) with the purpose to gather deta... |
3437_44899 | The security researchers at FireEye security Abdulellah Alsaheel and Raghav Pande have found a way to exploit the Microsoft security tool Enhanced Mitigation Experience Toolkit to hack itself. The Enhanced Mitigation Experience Toolkit was introduced by Microsoft to raise the cost of exploit development, it cannot be c... |
1118_23715 | Recently Cloud-based security service provider Incapsula detected an application layer DDoS attack conducted hijacking a huge volume of traffic to victims website. The website of Incapsula customer was flooded by a DDoS attack, over 20 million GET requests from the browsers of over 22,000 machines targeted the website.... |
2277_36735 | One of the most known applications in Macs its Gatekeeper, but Patrick says that Gatekeeper can be easily misguided to run unsigned code, and according to him it is “easy to get around“ the Gatekeeper protections like XProtect anti-malware, sandboxing and kernel code-signing., As a former NSA staffer, Patrick Wardle wo... |
1384_27349 | The malware analysts consider Poweliks a very complex code which use several code layers to hide itself from prying eyes, it is able to survive without any file creation and this circumstance makes it very insidious, he performs every operation in memory and maintain persistence through a smart use of the Windows regis... |
4570_54036 | A group of security researchers from the Newcastle University devised a method to hack VISA credit cards is just six seconds., The technique relies on a Distributed Guessing Attack in which online payment websites are used to discover the data on VISA credit cards. The attackers submit data to online payment websites a... |
237_6205 | It’s happened, today has been diffused the news that users’ passwords of the most famous business social network LinkedIn have been stolen and leaked on Internet. The company, through it blog, has confirmed the event declaring that more than six million passwords were compromised. Following the message published, We wa... |
1271_25791 | Google has recently made a significant change to the management process for permissions on Android devices, unfortunately security experts noticed that the change could advantage bad actors that intend to conduct attacks against the mobile platform., “When an app updates, it may need to use additional capabilities or i... |
6787_73332 | Cisco released security patches to address severe vulnerabilities in Prime Collaboration Provisioning (PCP) solution, one of the issues was rated as critical., The vulnerabilities have been found by Cisco during internal security testing and there is no evidence of attacks exploiting the flaws in the wild., The Prime C... |
5638_62447 | The US CERT is warning of Potential Hurricane Harvey phishing scams, the experts fear crooks may start using malicious emails purportedly tied to the storm., US-CERT is advising users to remain vigilant when receiving unsolicited emails with attachments or links purporting to be related to the Hurricane Harvey that rec... |
3347_44265 | Johannes Ullrich, security expert at the SANS Technology Institute, spotted an OS X scareware campaign that leverages fake Adobe Flash Player installers to trick users into downloading malicious software. The expert discovered the malicious campaign while analyzing Facebook clickbait scams., “They do not rely on a vuln... |
6774_73229 | The huge trove of data was contained in a file named “,” according to the experts the information is authentic and comes from Myheritage., “Today, June 4, 2018 at approximately 1pm EST, MyHeritage’s Chief Information Security Officer received a message from a security researcher that he had found a file named “myherita... |
4623_54451 | Security researchers have discovered two distinct APT groups, PROMETHIUM and NEODYMIUM, that exploited the same Flash Player zero-day vulnerability (CVE-2016-4117) in cyber espionage campaigns on Turkish citizens living in Turkey and various other European countries. Both groups exploited the flaw before its public dis... |
4152_50462 | I was surfing the Internet searching for interesting data about the ShadowBrokers group that leaked exploits and hacking tools belonging to the NSA Equation Group., I have found a very intriguing analysis of the popular security researcher krypt3ia that has analyzed the Bitcoin transactions linked to the #ShadowBrokers... |
2951_41558 | Data belonging to thousands of British Gas customers have been posted online, the company has already contacted 2,200 users to warn them about the data breach. The customers’ records leaked online include email addresses and account passwords, the account details were posted to online text-sharing service Pastebin., Ac... |
7476_78483 | British and Dutch data protection regulators have fined Uber with $1,170,892 for the 2016 security breach that exposed personal data of 57 million of its users., In November 2017, the Uber CEO Dara Khosrowshahi announced that hackers broke into the company database and accessed the personal data (names, email addresses... |
4483_53302 | The OpenSSL Project has released an update for the 1.1.0 branch (OpenSSL 1.1.0c) to fix a number of vulnerabilities. One of the issues solved with the update is the high severity denial-of-service (DoS) flaw CVE-2016-7054 that was reported by Robert Święcki from the Google Security Team., The CVE-2016-7054 vulnerabilit... |
553_13485 | The cybercrime industry knows no crisis, new services are offered in the underground and criminals operating in different sectors are increasing their interest in the possibility to adopt cyber tools to organize prolific scam and fraud., Underground offers everything necessary to commit a cyber crime, from tools for ha... |
7119_75841 | According to a report by the Centre for Cyber Security (Center for Cybersikkerhed), a department of military security agency FET (Forsvarets Efterretningstjeneste), the cyber threat against the Danish financial sector is very high., The centre monitors the attacks against Denmark and Danish businesses., “The threat pos... |
2107_35386 | Secunia has recently released its annual study of trends in software vulnerabilities, an interesting report that highlights the impact of the presence of flaws in common software and provide useful details on the way bad actors exploited it. According data provided by the Security firm Secunia, the number of Web brows... |
2915_41302 | Bad news for network administrators, new attacks on Network Time Protocol can defeat HTTPS and create serious problems., The bugs exploited in the attacks was discovered by the experts at the Cisco’s Talos group that has been working on the code base of the time-synch daemon., “The Network Time Protocol daemon (ntpd) i... |
2819_40559 | Shopify is a multi-channel commerce platform that helps people sell online, in-store, and everywhere in between. The popular security researchers Davis Sopas at WebSegura has discovered a Reflected Filename Download vulnerability in the Shopify service. Sopas already sent a security report to Shopify explaining that it... |
733_17577 | The latest nightmare for US Administration is named Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT security, the image of NSA and US IT companies are seriously compromised such the trust of worldwide consumers., The extension of US surveillance activities see... |
621_14953 | Pierluigi Paganini, (Security Affairs – Cyber espionage, NetTraveler) |
7598_79583 | A hacker breached the Australian Early Warning Network over the weekend and abused it to send out an alert via SMS, landline, and email to the subscribers of the Aeeris firm that provides the service., The Early Warning Network service provides a multi-channel alert system that leads the world in capability. The compan... |
6423_70036 | A few days ago, researchers at Microsoft announced that Windows Defender Antivirus blocked more than 80,000 instances of several malicious code that exhibited advanced cross-process injection techniques, persistence mechanisms, and evasion methods., According to Microsoft, the malware were new variants of Dofoil (also ... |
378_9622 | , Ron Kelson,, Pierluigi Paganini,, Fabian Martin,, David Pace,, Benjamin Gittins, Every day billions of people submit an unimaginable number of queries through Internet search engines. These powerful instruments have profoundly changed the user’s perception of web content., Before search engine popularity, “web port... |
4338_52008 | X.Org is a widely used open-source implementation of the X Windows System (aka X11 or X-Windows) that is the graphical windowing system adopted by Unix and Linux operating systems. A set of libraries implements the routines used within X-Windows applications,, The security researcher Tobias Stoeckmann from the OpenBSD ... |
4934_56795 | Journalists from the BBC, Reuters and New York Times were among those spied on by, The German foreign intelligence service spied on journalists from various media agencies, including the BBC, Reuters and the New York Times., , According to the German magazine Der Spiegel, the number of reporters spied by the Bundesnach... |
3028_42054 | The independent security researcher Varang Amin and the chief architect at Elastica’s Cloud Threat Labs Aditya Sood have discovered a vulnerability in the D-Link Switches belonging to the DGS-1210 Series Gigabit Smart Switches., The security experts revealed the existence of the flaw at the ToorCon security conference,... |
7390_77800 | The U.S. Cyber Command (USCYBERCOM) is providing unclassified malware samples to VirusTotal intelligence service with the intent of sharing them with cybersecurity industry., The USCYBERCOM’s Cyber National Mission Force (CNMF) is going to share the unclassified malware samples on the CYBERCOM_Malware_Alert VirusTotal ... |
6958_74639 | Security experts from Proofpoint have uncovered a massive malspam campaign, crooks sent hundreds of thousands of emails delivering weaponized PDF documents containing malicious SettingContent-ms files., Experts attributed the malspam campaign to the cybercriminal group tracked as TA505, the attackers are spreading the ... |
2700_39710 | Lizard Squad is the popular hacking crew that brought the online gaming networks Sony PlayStation Network and Microsoft Xbox Live with major Distributed Denial-of-Service (DDoS) attacks., The hackers developed a tool dubbed Lizard Stresser that draws on Internet bandwidth from hacked home Internet routers worldwide., L... |
3250_43541 | According to Motherboard, a hacker associated with the “Crackas With Attitude” group has accessed accounts belonging to the director of National Intelligence, James Clapper., Yes, you are right, Crackas With Attitude is the same teenager who took over the CIA director John Brennan’s personal email account in October 20... |
1833_32332 | Every time there is a clamorous event cyber criminals try to take advantage of the people’s interest to run illegal activities, it is happened recently with the incident to the Air Asia Flight and is happening with the terroristic attack on the Charlie Hebdo., You have to consider that not only ordinary people search f... |
5116_58177 | The IOActive senior security consultant Tao Sauvage and the independent security researcher Antide Petit have reported more than a dozen of unpatched security vulnerabilities affecting 25 different Linksys Smart Wi-Fi Routers models., Out of 10 security vulnerabilities, six issues can be exploited by remote unauthentic... |
1012_22218 | The hypothesis that Edward Snowden has operated using a simple web-crawler is very curious, how is it possible that a lonely consultant had access to a so huge collection of documents from NSA archives? Why Does the NSA engage a so huge quantity of external consultant giving them secret documentation? In my opinion, it... |
4889_56458 | Psychological Operations are not a novelty in the military and Russia demonstrated a great ability in the adoption of such techniques., Top NATO General Petr Pavel confirmed that Russia was behind a false report of a rape by German soldiers in Lithuania, the operation aimed to undermine support for NATO’s new eastern f... |
4610_54340 | Some versions of Netgear routers remain affected by a security flaw that could be exploited by hackers to gain root access on the device and remotely run code. On Friday, a researcher who used the online moniker AceW0rm released a proof-of-concept code exploit because Netgear hasn’t replied to his ethical disclosure., ... |
3571_45930 | Two of security researchers from the Weizmann Institute have shown how hackers can target connected lightbulbs to steal sensitive data from Air-Gapped networks., The two researchers are Adi Shamir, the popular co-inventor of the RSA algorithm, and PHD student Eyal Ronen., The experts highlighted that for both devices, ... |
7648_80083 | Few weeks ago I wrote about “How Data Breaches Happen“, where I shared some public available “pasties” within apparently (not tested) SQLi vulnerable websites. One of the most famous data breaches in the past few years is happening in these days. I am not saying that the two events are linked, but I have fun in thinkin... |
6913_74317 | Security experts from ESET discovered that an APT group tracked as BlackTech is using code-signing certificates stolen from Taiwanese-based tech firm D-Link and the security company Changing Information Technology Inc., According to the experts, the cyber espionage group is highly skilled and most of its victims are in... |
1639_30225 | A new strain of the BASHLITE malware was detected by experts at Trend Micro shortly after the public disclosure of the ShellShock bug., The malware, named ELF_BASHLITE.A (ELF_FLOODER.W), includes the payload of the ShellShock exploit code and it had been used by threat actors to run distributed denial-of-service (DDoS)... |
417_10804 | This time I desire to speak about an interesting initiative of Group-IB company, a resident of the Moscow-based Skolkovo Foundation, that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system., The funds is co-financed by the Skolkovo Foundat... |
6298_68785 | Adobe has rolled out an emergency patch to address two Flash player vulnerabilities after North Korea’s APT group was spotted exploiting one of them in targeted attacks., Last week, South Korea’s Internet & Security Agency (KISA) warned of a Flash zero-day vulnerability (CVE-2018-4878) that has reportedly been exploite... |
6134_67243 | Researcher Ashutosh Barot has discovered a critical CSRF vulnerability in phpMyAdmin that could be exploited by attackers to perform malicious operations like drop tables and delete records., phpMyAdmin developers released the version 4.7.7 that addresses the CSRF vulnerability found by Barot., “By deceiving a user to ... |
6420_70007 | The investigation started in September 2015, after the group launched a DDoS attack on international online dating service AnastasiaDate demanding $10,000 for stopping the assault. The site of the company was taken down for hours., “Other attacks targeted online stores, payment systems, as well as websites offering bet... |
3663_46708 | According to the German BR24 News Agency, a computer virus was discovered at the Gundremmingen nuclear power plant in Germany., Based on the initial assessment conducted by the experts, the virus didn’t affect any critical parts of the power plant and wouldn’t pose any critical threat. The audit revealed that, unlike S... |
3817_47884 | Vulnerable SCADA and industrial control systems represent the entry point in critical infrastructure for hacking attacks. In many cases, patch management of these systems is very complex and in some specific scenarios known flaws could not be fixed for various technical reasons., Recently and ‘unpatchable’ vulnerabilit... |
7160_76134 | Microsoft Patch Tuesday updates for September 2018 address 61 vulnerabilities in Internet Explorer (IE), Edge, ChakraCore, Azure, Hyper-V, Windows components, .NET Framework, SQL Server, and Microsoft Office and Office Services. Of the 62 CVEs., 17 flaws are rated as Critical, 43 are rated Important, and just one is ra... |
5883_64958 | Do you use an iPhone? If yes, there is probably something that you need to know about it!, The Austrian developer and Google engineer, Felix Krause, has discovered a serious privacy issue in Apple iPhone that could be exploited by iOS app developers to silently take your photos and record your live video by enabling bo... |
6815_73555 | A new vulnerability tracked as LazyFP (CVE-2018-3665) involving side channel speculative execution affects Intel CPUs, like previous ones it could be exploited by hackers to access sensitive information from the affected system., The vulnerability was discovered by Julian Stecklina from Amazon Germany, Thomas Prescher ... |
3707_47000 | Last week pro-ISIS hacker group who is calling itself the Islamic State Hacking Division has published a “Kill list” of dozens of American military personnel purportedly involved in drone strikes against the IS in Syria and Iraq., , The hackers leaked online personal details of more than 70 US personnel., “Kill them wh... |
2509_38446 | Security experts have discovered and analyzed the activities of a financially motivated APT group, dubbed Morpho and Wild Neutron, that has targeted a large number of high profile companies worldwide., According to the analysis published by Kaspersky Lab, the Morpho APT group is specialized in corporate espionage and h... |
2320_37045 | CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are a powerful instrument for criminal crews to rapidly cash-out their efforts., In several cas... |
172_4110 | The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an hack. On Monday the server that hosts Medicaid was hacked, the news of the breach has been published on Wednesday.
In a first time the entity of the data breach has been estimated in 181,604 records... |
1486_28475 | My readers know very well the Egyptian hacker Ebrahim Hegazy, he is a great security expert and a friend of mine, which disclosed numerous critical flaws in most popular web services, including Microsoft, Yahoo and Orange., Last discovery of the cyber security expert is a SQL Injection in a Yahoo service that could be ... |
1810_32036 | The senior threat researcher with Trend Micro, Kyle Wilhoit, has recently discovered 13 different types of crimeware disguised as new versions for human machine interface (HMI) software for Siemens Simatic WinCC, GE Cimplicity, and Advantech device drivers., The news has been reported by the Dark Reading website, the e... |
88_1911 | The events of recent days from the closure of the Megaupload web site to the heavy offensive of the Anonymous group have distracted media attention from important cyber operations, in my opinion of military matrix, against Japan., Last week several Cyber attacks have been conducted against Japan institutions and corpor... |
2330_37124 | Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors with a trivial hack., Modern cars suffer many types of attacks, today I desire to show you an attack occurred recently in the... |
6511_70894 | MITRE is going to offer a new service based on its ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework to evaluate products based on their ability in detecting advanced persistent threats., “MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a curated knowledge base and mode... |
3225_43373 | In November 2015, the Russian antivirus firm Doctor Web reported the discovery of a new Linux ransomware dubbed Linux Encoder that was specifically designed to infect Linux systems. The Linux.Encoder1 ransomware encrypts files present on the systems, once a machine is infected it downloads the files containing attacke... |
4819_55926 | Cisco has released a security update for CISCO Prime Home remote management and provisioning solution to fix a flaw that could be exploited to authentication bypass. The experts at Cisco have discovered the critical authentication bypass flaw during an internal security testing., The Cisco Prime Home is a product used ... |
2931_41428 | , , , Once again thank you!, Pierluigi Paganini, (Security Affairs – Newsletter, SecurityAffairs) |
2430_37871 | More than 600 million Samsung smartphones could be opened to cyber attack due to the presence of a security flaw in the validation of the Swiftkey language pack updates. The security flaw, coded as CVE-2015-2865, affects to the mechanism used for adding new languages and upgrading existing ones in the mobile devices o... |
4748_55369 | Security experts discovered a new effective Gmail phishing attack that is able to deceive also tech-savvy people. Crooks leverage on specially crafted URLs to trick victims into providing their Gmail credentials on a phishing page., The malicious messages are sent from one of the victim’s contacts and pretend to carry ... |
301_7827 | Many experts are sure, the new horizons of intelligence are in the social media and in the ability to control them. Governments are more careful on the analysis of social media and the vast amount of information which they hold., Intelligence agencies have learned that Social networks and forums are exceptional instrum... |
2452_38032 | The Dark Web is known to be “the place” for sites where it can be found drugs, child pornography, weapons, because these websites can live on without disclosing the server location what makes life difficult for law enforcement catching the people running them., But lately more and more flaws are coming out of the Dark ... |
2976_41718 | We recently reported that CryptoWall 3.0 has allegedly caused over $325 million in annual damages. CryptoWall first emerged in April 2014. Its first major upgrade was dubbed CryptoWall 2.0, and first emerged in October 2014. CryptoWall 3.0 then emerged in January 2015 and terrorized organizations on a global scale. Now... |
7267_76950 | As a consequence of the data exposure, the company is going to shut down the social media network Google+., The root cause of the data breach is a security vulnerability affecting one of Google+ People APIs that allowed third-party developers to access data for more than 500,000 users., Exposed data include including u... |
854_20019 | Atrax is the name of the last crimekit that is sold in the underground market, its particularity is the capability to exploit Tor networks to communicate with Command & Control infrastructure. Jonas Mønsted of the Danish security firm CSIS, published a blog post that describes in depth the crimekit. The malware isn’t ... |
1872_32791 | A new critical vulnerability is threatening the Linux community, the flaw affects the glibc GNU C library. The vulnerability is present in all Linux systems dating back to 2000 and could be exploited by attackers to execute code and remotely gain control of Linux machines., The vulnerability was first discovered by res... |
5684_62909 | Crooks are abusing Facebook CDN (Content Delivery Network) servers to store malware and to deliver it evading detection exploiting the trust in the CDN network of the social network giant., Researchers from MalwareHunter team uncovered several campaigns leveraging Facebook CDN servers in the last two weeks, in the past... |
4024_49532 | Delilah is a strain of malware developed to extort victims into stealing insider data, it was first discovered on crime forums by the Israeli intelligence firm Diskin Advanced Technologies., Deliah is not distributed in open crimeware forums, instead, it is shared in among exclusive criminal communities., Delilah repre... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.