A bug in the popular Slack application could be exploited by attackers to steal an access token and take over a user account. A serious flaw in the popular work chat application Slack could be exploited to take over a user account. The vulnerability was discovered by bug bounty hunter Frans Rosen who demonstrated that is possible […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html · Shamoon 2 malware, ASERT has shed light on the C2 and the infection process · US […]
In January, a cyber attack breached some systems at Barts NHS Trust and forced them offline. Hackers exploited a zero-day vulnerability. In January, a cyber attack breached some systems at Barts NHS Trust and forced them offline. Barts Health Trust runs the Royal London, St Bartholomew’s, Whipps Cross, Mile End and Newham hospitals. The hackers used […]
Rapid7 released the Metasploit Vulnerable Services Emulator, a new tool that can be used by IT experts to emulate vulnerable services. Which is the best way to protect a system? You need to think of the system in the attacker’s perspective, for this reason, Metasploit has now a new tool that can be used to […]
Exclusive: MalwareMustDie for Security Affairs released the list of the sites under attack. A criminal gang is using SSH TCP direct forward attack technique. MalwareMustDie is back and has published his the first post of 2017. The popular malware researcher has uncovered a cyber crime gang that is harvesting credentials and credit card numbers from major websites […]
The US Vice President Mike Pence’s personal AOL account was hacked, once again politics were breached due to wrong security posture. Pence has been harshly criticized after the discovery that he used his personal AOL account for Government issues. In 2016 attacker who compromised the Pence’s account sent out emails to his contacts saying he had been […]
Researchers from Cisco Talos team spotted a new strain of malware that leverages PowerShell scripts to fetch commands from DNS TXT records. Malware researchers at Cisco Talos have published a detailed analysis on a targeted attack leveraging a weaponized Microsoft Word document that is spread in spam emails as an attachment. The malicious code used in the […]
According to Cloudflare, an initial analysis conducted its experts reveals that no personal data was leaked due to the CloudBleed issue. On February 17 the Google Project Zero researcher Tavis Ormandy disclosed a serious bug in Cloudflare infrastructure, so-called Cloudbleed. Ormandy discovered that Cloudflare was leaking a wide range of sensitive information, including authentication cookies […]
Trolling, Doxing & Cyberstalking: Cybercrime & The Law. Cybercrime is one of the greatest threats facing US with implications for national security. According to the US Department of Justice (DOJ), “cybercrime is one of the greatest threats facing our country and has enormous implications for our national security, economic prosperity, and public safety. The range of […]
Security experts at Trustwave have discovered a hidden backdoor in Internet of Things devices manufactured by the Chinese firm DblTek. Researchers from Trustwave have discovered a backdoor in IoT devices manufactured by a Chinese vendor that is refusing to fix it. The backdoored devices are produced by the VoIP firm Dbltek, the researchers speculate the backdoor was […]