Breaking News

Pierluigi Paganini August 03, 2017
New TrickBot banking Trojan variant borrows spreading capabilities from Wannacry

A cyber gang is improving its version of the TrickBot banking Trojan by implementing the self-spreading worm-like capabilities used by WannaCry and NotPetya Cybercriminals most of all are capitalizing the lesson from the recent WannaCry and NotPetya ransomware massive attacks. At least one cyber gang is improving its version of the TrickBot banking Trojan by implementing the self-spreading […]

Pierluigi Paganini August 03, 2017
Former Bupa employee offered 1 million customer records for sale on dark web

Former Employee of the Healthcare giant Bupa offered for sale records of 1 Million clients on Dark Web. A former employee of healthcare giant Bupa was selling between 500,000 and 1 million records on the healthcare giant Bupa was selling between 500,000 and 1 million records on the dark web. The former employee whose identity […]

Pierluigi Paganini August 03, 2017
The bateleur backdoor is the new weapon in the Carbank gang’s arsenal

Experts at Proofpoint noticed the infamous cyber crime gang Carbanak has added a new JScript backdoor dubbed Bateleur Backdoor to its arsenal. According to researchers at security firm Proofpoint, the infamous cyber crime gang cyber crime gang Carbanak has added a new JScript backdoor dubbed Bateleur Backdoor to its arsenal. Carbanak, aka Carbanak, aka FIN7, has also used […]

Pierluigi Paganini August 02, 2017
The Svpeng Trojan continues to evolve, the last variant includes keylogger capabilities

Security experts at Kaspersky discovered the dreaded Svpeng Trojan has been recently modified to implement keylogger features. Cyber criminals are becoming even more aggressive and are using new stealth techniques. Security experts at Kaspersky have discovered that one of the most dangerous Android banking Trojan, Svpeng, has been recently modified to implement keylogger features to […]

Pierluigi Paganini August 02, 2017
ICS-CERT Issues Warning of CAN Bus Vulnerability

The US ICS-CERT issued an alert in response to a public report of a vulnerability in the Controller Area Network BUS (CAN BUS). On Friday (28th of July), the Industrial Controls Systems Cyber Emergency Team or ICS-CERT, issued an alert in response to a public report of a vulnerability in the Controller Area Network (CAN), […]

Pierluigi Paganini August 02, 2017
Roughly 175,000 Chinese Internet Connected security cameras can be easily hacked

An estimated 175,000 Internet of Things (IoT) connected security cameras manufactured by Shenzhen Neo Electronics are vulnerable to cyber attacks. According to a new report from security provider Bitdefender, roughly 175,000 connected security cameras are vulnerable to cyber attacks. The vulnerable cameras are manufactured by the Chinese company Shenzhen Neo Electronics that offers surveillance and security solutions, […]

Pierluigi Paganini August 01, 2017
Security flaws affect TCUs used in BMW, Ford, Infiniti, and Nissan vehicles

Three security researchers have discovered security vulnerabilities in the telematics control units (TCUs) used in BMW, Ford, Infiniti, and Nissan vehicles. Three security researchers have discovered security vulnerabilities in the telematics control unit (TCU) manufactured by Continental AG that is installed on various car models manufactured by BMW, Ford, Infiniti, and Nissan. The researchers are Mickey Shkatov, […]

Pierluigi Paganini August 01, 2017
Pharmaceutical giant Merck confirmed NotPetya attack disrupted operations worldwide

The US pharmaceutical company Merck revealed that the massive NotPetya cyberattack has disrupted its worldwide operations. The US pharmaceutical company Merck revealed that the massive NotPetya cyberattack has disrupted its worldwide operations. The news was part of the Merck’s financial results announcement for the second quarter of 2017, according to the pharmaceutical giant the ransomware destructed operations […]

Pierluigi Paganini August 01, 2017
TOPransom: From eMail Attachment to Powning the Attacker’s Database

TOPransom – Analyzing the entire process from getting an email attachment to powning the ransom server trying to stop the infection. Hi folks, today I want to share a quick but intensive experience in fighting cybercrime. I wish you would appreciate the entire process of getting an email attachment to powning the ransom server trying […]

Pierluigi Paganini August 01, 2017
CopyFish Extension for Chrome Stolen And Updated With Trojan Adware

Crooks recently hacked the popular Google Chrome extension Copyfish after compromising the Chrome Web Store account of German developer team a9t9 software. Trojan malware has been around for a long time. A user installs an application to accomplish one task, but behind the scenes, the application is performing a completely different task — usually unwanted. The […]