Breaking News

Pierluigi Paganini September 21, 2016
Over 840,000 Cisco systems affected by the Equation Group’s flaw CVE-2016-6415

The Shadowserver Foundation has conducted a scan of the Internet for CISCO devices running IOS software affected by the CVE-2016-6415 vulnerability. Recently experts from CISCO discovered a vulnerability, tracked as CVE-2016-6415, in IOS system,while investigating the Equation Group‘s exploits leaked by the Shadow Broker hacker group. In particular, experts from CISCO were evaluating the impact […]

Pierluigi Paganini September 21, 2016
It seems that Internet Explorer and Edge users were in danger for so long

Microsoft recently issued the patches to fix set of flaws in Internet Explorer, years after their discovery by black-hats in the hacking underground. Microsoft finally fixed a set of vulnerabilities in Internet Explorer years after they were discovered by black-hats in the hacking underground. I have contacted a black hat in the underground that who made […]

Pierluigi Paganini September 21, 2016
Italian security firm spotted BadEpilogue: The Perfect Evasion

Security firm Certego has been detecting multiple viral spam campaigns leveraging a new malware evasion technique it called BadEpilogue. Starting from May 2016, Certego Threat Intelligence platform has been detecting multiple viral spam campaigns using a new evasion technique. These attacks are able to hide malicious attachments inside a specific area of the MIME/Multipart structure and […]

Pierluigi Paganini September 21, 2016
Experts found apps in Google Play serving the Overseer malware to overseas travelers

Google has removed from the Google Play store four apps trojanized with the Overseer malware to target overseas travelers seeking embassy information. Google has removed from the official Google Play store four trojanized apps that targeted overseas travelers seeking embassy information and news for specific European countries. Three apps were named “Embassy”, “European News”, “Russian […]

Pierluigi Paganini September 20, 2016
A mistake allowed us a peek into North Korea Internet infrastructure

A mistake allowed us a peek into the North Korea Internet infrastructure, a security researcher discovered that Pyongyang has just 28 websites. The North Korea is one of the countries that most of all is investing to improve its cyber capabilities and that has one of the largest cyber armies. But North Korea is also known for […]

Pierluigi Paganini September 20, 2016
Car Hacking – Chinese hacker team remotely hacked Tesla Model S

A group of security researchers from the Chinese firm Tencent have found a series of flaws that can be exploited to remotely hack a Tesla Model S. Security experts at the Keen Lab at Chinese firm Tencent have found a series of vulnerabilities that can be exploited by a remote attacker to hack an unmodified […]

Pierluigi Paganini September 20, 2016
How an insecure messaging app led to fall of a terrorist organization in Turkey?

MIT (Turkish Intelligence Agency) has hacked one-single server of a messaging app in Lithuania in order to identify members of an Islamic terrorist group. Within the harshness of political controversies turned up in Turkey with the recent coup attempt at July of 15th [1], it seems that a cyberwar between MIT [2] (Turkish National Intelligence […]

Pierluigi Paganini September 20, 2016
OpenSSL will patch this week high severity vulnerability

The OpenSSL Project announced early this week that it will release as soon as possible updates to that patch multiple vulnerabilities. One of the flaws that affect the popular toolkit has a “high” severity. The Project plans to release OpenSSL versions 1.1.0a, 1.0.2i and 1.0.1u next Thursday. The OpenSSL Project confirmed that the security updates that will […]

Pierluigi Paganini September 19, 2016
Vawtrak v2, a close look at the cybercriminal groups behind the threat

Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its criminal ecosystem. Security experts from the cyber threat intelligence firm Blueliv have conducted a technical investigation on the banking Trojan Vawtrak v2 and activities of the cybercriminal groups behind the threat. Vawtrak is a threat that has been […]

Pierluigi Paganini September 19, 2016
Boffins analyzed EXIF metadata in photos on principal blackmarkets

Two researchers have analyzed images Exif metadata included in the photos used by crooks to advertise their products on black marketplaces in the dark web. Darknets are a privileged environment for crooks that intend to develop a prolific business protecting their anonymity, anyway, there are several aspects that they need to consider in order to […]