The European Commission was the victim of a massive DDoS attack that brought down its internet access for hours on Thursday. A massive DDoS attack targeted the European Commission website, fortunately, according to an official statement from the organization the internal security team repelled the attack without damages. The experts from the European Commission confirmed that some servers […]
Security experts from Checkpoint have discovered a new malware-based campaign through Facebook leveraging an image obfuscation trick dubbed ImageGate. Security experts from Checkpoint have discovered a new malware-based campaign through Facebook. Crooks leverage an image obfuscation trick, dubbed ImageGate, to spread the Locky ransomware via Facebook. Experts highlighted that the image obfuscation trick is able to bypass Facebook’s security checks. “Check […]
Criminal gangs like the Cobalt gang are now focusing their efforts on the banks to steal cash directly from the ATMs with jackpotting attacks. Security experts are assisting a change of tactics for the criminal organizations who target the ATMs and online banking credentials. Crooks are now focusing their efforts on the banks in the attempt to […]
A group of researchers from the security firm Promon has demonstrated how cyber criminals could take control of the Tesla Car and steal it. A group of security experts from security firm Promon has demonstrated how to exploit the Tesla app (for both Android and iOS) to locate, unlock and steal a Tesla Model S. The […]
Personal Data belonging to 134,386 United States Navy current and former sailors were leaked. NCIS and HPE are investigating the case. The United States Navy has confirmed that the personal data of 134,386 current and former employees were leaked. Names and social security numbers of the internal staff were stored in a laptop used by […]
A researcher released a PoC exploit for the cve-2016-9311 flaw that can cause the crash of the NTP daemon and triggers a DoS condition on Windows systems. The NTP protocol could be exploited by hackers as an attack vector. The NTP is a networking protocol widely used for the clock synchronization purpose between systems over packet-switched, […]
Security researchers from Kaspersky Lab are warning of targeted attacks with InPage zero-day against a number of organizations in Asia. According to experts from Kaspersky Lab, a number of organizations in Asia have been targeted with InPage zero-day. InPage is a word processor widely used in Asia because is supports languages such as Urdu, Persian, Pashto and […]
Speake(a)r attack – Security researchers have demonstrated how to turn headphones into a microphone to spy on all target conversations A group of security researchers at Ben Gurion University have demonstrated that it is possible to turn headphones into a microphone to spy on all target conversations in the background without raising suspicious. The team […]
It has happened again, most of the Apple devices crashes when the owner plays this iPhone-freezing video. Be careful when clicking on suspicious links. A new bug in iPhone is threatening Apple users, most of the Apple devices crashes when the owner plays a video. An iPhone-freezing video is circulating online, when users play it in […]
The Tropic Trooper APT continues to target Asia, this time government Taiwanese organizations and companies in the energy sector. The Tropic Trooper APT that has been active at least since 2012, it was first spotted last year by security experts at Trend Micro when it targeted government ministries and heavy industries in Taiwan and the military in the Philippines. Now […]