[By Cesare Burei, Margas on courtesy of @CLUSIT â Rapporto Clusit 2017 – All right reserved] Until the corporate Risk Managers dealing with Cyber Risk, and there are not many of these, start working at all levels, who shall be entrusted with the management of Cyber Risks and, more specifically, with the transfer of risk […]
Japan plan to develop a hack proof satellite system to protect transmissions between satellites and ground stations with a dynamic encryption of data. Japanâs Internal Affairs and Communications Ministry plans to develop a communications system to protect satellites from cyber attacks. The hack proof satellite system will protect transmissions between satellites and ground stations implementing […]
Splunk has fixed the security issue in the JavaScript implementation, tracked as CVE-2017-5607, that can be exploited to siphon data. Splunk has fixed the security issue in the JavaScript implementation, tracked as CVE-2017-5607, that leaks user information. Splunk provides the leading platform for Operational Intelligence that is used to search, monitor, analyze and visualize machine data. Splunk […]
The Linux kernel flaw exploited by the hackers at the Zero Day Initiativeâs Pwn2Own 2017 competition to hack Ubuntu has been patched. The Chaitin Security Research Lab (@ChaitinTech) discovered a Linux Kernel flaw, , tracked as CVE-2017-7184, during the last Pwn2Own 2017 competition. The experts hacked Ubuntu Desktop exploiting a Linux kernel heap out-of-bound access and earned $15,000 […]
A series of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or business credentials. A wave string of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or business credentials. The phishing messages pretend to be sent from a travel agency […]
Malware researchers at Forcepoint have discovered a new modular malicious code, dubbed Felismus RAT, that appears the work of skilled professionals. Malware researchers at Forcepoint have discovered a new modular malicious code dubbed Felismus RAT. The malware has been used in highly targeted campaigns, experts believe the Felismus RAT is the work of skilled professionals. […]
The McDonald’s Canada career website was recently subject to a cyber-attack. Hackers stole records of 95,000 job seekers. McDonald’s Canada confirmed that hackers have stolen the personal data of about 95,000 job seekers from its recruitment website. The data were provided by candidates searching for a job at McDonald’s Canada since March 2014. The company […]
Today the German Military is going to launch a cyber command, the Bundeswehr’s new Cyber and Information Space (CIR) Command. Today the German Military is going to launch a cyber command, the Bundeswehr’s new Cyber and Information Space (CIR) Command, a structure that is considered strategic for the defence of the country from cyber attacks. According […]
A security expert demonstrated how to hack SmartTV using a low-cost transmitter for embedding malicious commands into a rogue DVB-T signals. The number of IoT devices continues to grow, but unfortunately, their level of security is often very poor and at the same time the number of threats to smart objects is rapidly increasing. Due to security […]
WikiLeaks has published the third batch of documents dubbed Marble that revealed the CIA anti-forensics tool dubbed Marble framework. WikiLeaks released the third batch of the CIA Vault7Â archive that shed light the anti-forensics tools used by the intelligence Agency, The first tranche of CIA documents from Vault7 was related to hacking tools and techniques, while […]