According to a study published by the independent anti-virus testing outfit AV-TEST, the number of malicious search engine results has been increasing. The vast majority of the Internet users blindly trust data provided in response to their queries to the search engines. Actually, search engine results are increasingly poisoned with malicious links, the experts noticed a […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Linux.BackDoor.FakeFile.1, a new Linux backdoor in the wild American hacker The Jester defaced a Russian […]
Security experts observed attackers launching a powerful LDAP DDoS, the new amplification method could peak Terabit-Scale attacks. LDAP DDoS attacks are the novelty in the threat landscape, the Lightweight Directory Access Protocol (LDAP) protocol could be abused to power massive DDoS attacks. The LDAP is an open standard application protocol for accessing and maintaining distributed […]
Exclusive: The security researcher MalwareMustDie has found a new Linux/IRCTelnet malware– made in Italy – that aims IoT botnet connected by IRC and Telnet. It is able to generate an IPv6 DDoS and performing NEW dangerous capabilities that Mirai was unable to cover. In a brief interview to Security Affairs @unixfreakjp of MalwareMustDie group explains […]
The Australian Red Cross Blood Service confirmed the data leak that exposed a backup database containing the personal details of donors. This data leak is considered by security experts one of the most severe due to the nature of the target, the Australian Red Cross Blood Service. The sensitive database was discovered on October 24 by […]
Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back it. The Mirai botnet, this name is familiar to security experts due to the massive DDoS attack that it powered against the Dyn DNS service a few days ago. The Mirai malware was first spotted […]
Hackers of the Cyber Hunta collective leaked thousands of emails allegedly stolen from the account of Vladislav Yuryevich Surkov. Last week a Russian government website was hacked by the Jester hacker who defaced the website of the Russian Ministry of Foreign Affairs, MID.ru in retaliation for the recent attacks against US targets. This week a Ukrainian hacker collective […]
The young hacker Mys7erioN announced to have hacked into the database of a US organization, the Michigan State University. Data leaked online. Today I was contacted via Twitter by Mys7erioN who revealed me to have hacked into the database of a US organization, the Michigan State University. As proof of the hack, Mys7erioN published on Pastebin the records […]
Researchers from ENSILO have devised a method, called AtomBombing, to inject malicious code in Windows OS that bypasses modern anti-malware tools. Security experts from ENSILO have devised a method, called AtomBombing, to inject malicious code in Windows operating system that could not be detected by modern anti-malware tools. The Atom Tables are data structures used by the operating system to […]
The person behind the Fappening case, Ryan Collins (36), received a lighter penalty than the five years prison initially on the table for the guilty plea. Do you remember the Fappening case? In 2014, a cache of nude photos and videos of celebrities was leaked online, hackers have stolen them by accessing the iCloud accounts […]