The role of China (PRC) in the worldwide cyber espionage game of conditioning political life: when reserved information are brandished against the political opponent. In the days of testimony of U.S. Federal investigators about the role played during the last year by Russians, their alleged cyber operation is once again under examination. The mainstream media […]
The vendor “SunTzu583” is offering for sale over 20 million Gmail and 5 million Yahoo login credentials on the Dark Web A vendor with the online moniker “SunTzu583” is reportedly selling millions of login credentials for Gmail and Yahoo accounts on a black market in the dark web. Over 20 million Gmail accounts and 5 million […]
The McDelivery application used by McDonald’s customers in India was found to be leaking the personal data of more than 2.2 million users. McDelivery is a web application used by McDonald’s customers in India that was found to be leaking the personal information of more than 2.2 million users. The issue was discovered by researchers at security […]
After the leak of the CIA Vault7 archive, experts from CISCO warn of Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution flaw. Recently Wikileaks announced it is planning to share with IT firms details about vulnerabilities in a number of their products, the flaw are exploited by the hacking tools and […]
The security expert Matt Nelson has devised a new method that leverages App Paths to bypass the User Account Control (UAC) only on Windows 10. The researcher detailed a bypass technique that is quite differed to the previous ones he devices, the new method “doesn’t rely on the IFileOperation/DLL hijacking approach”. “I’ve previously blogged about two different bypass techniques, […]
The researchers have discovered a new piece of ransomware featuring a Star Trek theme, dubbed Kirk ransomware, the first one accepting Monero payments. Ransomware continues to be one of the most profitable cyber threats, for this reason, every week we see new strains of malware in the wild. The researchers have discovered a new piece […]
Fappening 2.0, Nude pictures of several celebrities have been leaked online, including Rose McGowan, Amanda Seyfried and Jillian Murray. Here we are speaking again of Fappening, new nude pictures of celebrities have been leaked online. In 2014 for the first time, several lots of private photographs of celebrities were leaked online, the phenomenon was dubbed […]
Security experts at Arbor Networks linked a new Acronym malware to the malicious code used by threat actors behind the Operation Potao Express. Security experts at Arbor Networks have spotted a new strain of malware that could be linked to the malicious code used by threat actors behind the Operation Potao Express. The researchers started […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html · ELF_IMEIJ, a new Linux malware is spreading in the wild · Security Affairs newsletter Round 103 […]
Assange sent an email to tech firms including “a series of conditions” that they need to fulfill before gaining access to details included in the Vault 7. A couple of weeks ago Wikileaks published the Vault 7 archive, a huge trove of files detailing CIA hacking tools and capabilities. The files allegedly originated from a high-security […]