Breaking News

Pierluigi Paganini June 07, 2017
Russia-linked hacker group APT28 continues to target Montenegro

Once again, Montenegro was targeted by the Russia-linked hacker group APT28, according to the experts it is just the beginning. On June 5 Montenegro officially joined NATO alliance despite the strong opposition from Russian Government that threatened to retaliate. Cybersecurity experts believe that a new wave of attacks from the cyberspace will hit the state. In February, for […]

Pierluigi Paganini June 07, 2017
Exfiltrating data from Air-Gapped Networks via Router LEDs

A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware that controls router LEDs. A few months ago a group of researchers from Israeli Ben-Gurion University devised a new technique to exfiltrate data from a machine by using a malware that controls hard drive LEDs, now […]

Pierluigi Paganini June 07, 2017
4 Possible Ways to Make Your Browser Hacker-Proof

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web. Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various […]

Pierluigi Paganini June 07, 2017
FBI arrests NSA contractor Reality Leigh Winner for leaking top-secret report

The FBI agents arrested the NSA contractor Reality Leigh Winner for leaking the top-secret report, here’s how she was identified. Yesterday the online news outlet The Intercept published a top-secret NSA report that shows Russian state-sponsored hackers tried repeatedly to hack the US voting systems before last 2016 Presidential election. A few hours later, it is […]

Pierluigi Paganini June 06, 2017
The Active Cyber Defense Certainty Act Makes Hacking Back Anything But “Certain”

Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active Cyber Defense Certainty (ACDC) Act? In a time where attribution of cyber crimes is all but impossible, the idea of allowing companies to ‘hack back‘ at their attackers seems far-fetched. However, Tom Graves (R-GA) has […]

Pierluigi Paganini June 06, 2017
Malvertising campaign in Google Search redirected users to tech support scam

Malicious ads in Google search results for the US retail giant Target redirected users to a tech support scam. The malvertising campaign was first reported last week by a US user who posted his observations to a StackExchange thread and was then reported by Bleepingcomputer.com. Just querying Google for the term “target,” users were displayed on the […]

Pierluigi Paganini June 06, 2017
NSA top-secret report details Russian cyber operations days before 2016 election

Russian intelligence powered a cyber attack on at least one US voting software supplier and sent spear-phishing emails to election officials just days before Election The online news outlet The Intercept obtained access to a top-secret NSA report that shows Russian state-sponsored hackers tried repeatedly to hack the US voting systems before last 2016 Presidential election. […]

Pierluigi Paganini June 06, 2017
Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign

Experts killed tens of thousands of subdomains used by crooks to host the RIG Exploit Kit that were set up with a domain shadowing campaign. GoDaddy and RSA Security, with the support of other security companies and researchers, have shut down tens of thousands of illegally established subdomains used by crooks to host the RIG Exploit […]

Pierluigi Paganini June 05, 2017
Crooks leverages a new technique to deliver Malware via PowerPoint presentations

Security experts reported crooks are using a new technique to deliver malware through PowerPoint files, researchers warn of attacks in the wild. Crooks are using a new technique to deliver malware through PowerPoint documents. Security researchers recently discovered several malicious PowerPoint files that exploit the mouseover events to execute PowerShell code. Threat actors are sending out spam […]

Pierluigi Paganini June 05, 2017
Defendant punished with 6-Months jail for refusing to give Police his iPhone Passcode

US judges have other opinions to punish suspects that decide to don’t collaborate with police giving the iPhone passcode to unlock their devices. Forgetting passwords for an electronic device could be an option for suspects to avoid complying with a court order, but sometimes things can go wrong. US judges have other opinions to punish suspects that […]