If you are one of the victims of the Jigsaw ransomware there is a good news for you, experts from CheckPoint Security have defeated it once again. Let’s start the day with a good news, the Jigsaw ransomware has been decrypted again. The JIGSAW ransomware was first spotted in April when experts noticed that the threat slowly […]
What about cyber security issues discussed during the NATO members during the Warsaw summit held in Poland on 8 and 9 July 2016. At the Warsaw Summit this weekend NATO, as anticipated weeks ago, the alliance has officially recognised cyberspace as a military operational domain. This means that the NATO alliance will respond with conventional […]
Experts from Talos team have found a link between the drop in the Angler Kit usage and the crackdown against the Lurk gang. Security experts believe to have found a link between the drop in the Angler Kit usage and the crackdown against the Lurk gang. Law enforcement arrested suspects in June, authorities accused them […]
Terrorism – JIHADIST OPS – Jul.03-10, 2016 – This is merely an intel brief. Subscribe GII for a more comprehensive and developed MENA and/or SE Asia report. GLOBAL INTELLIGENCE INSIGHT Global Intelligence Insight delivers reports on worldwide jihadist operations with a particular focus on the Middle East and North of Africa, partnering with SecurityAffairs.co and […]
ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers to gain control over victim’s device The gamers are going crazy for the last Nintendo game Pokemon GO which uses augmented reality , the mobile app is used by players to walk around and collect […]
A Ukrainian Hacker has breached the servers of the Polish Telecom Company Netia SA and leaked on an underground forum the stolen data. A Ukrainian hacker going by the pseudonym of Pravy Sektor has hacked the servers of Poland’s telecom company Netia SA, the second largest telecom company in the country. The hackers stole personal details […]
A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and Georgetown University has devised a method for hacking mobile devices by using hidden voice commands embedded in YouTube videos. In order to hack […]
Today, thanks to the support of Aveek Sen, I have interviewed the hacker that goes online with the pseudonymous of s1ege. s1ege is a member of the Ghost Squad and was one of earlier components of the AnonGhost hacker collective. The split occurred as Mauritania Attacker and few others of AnonGhost joined ISIS. Enjoy the interview […]
Threat actors in the wild are behind the Realstatistics campaign are leveraging on out-of-date CMSs to deliver the CryptXXX ransomware. Security experts from Sucuri security firm have spotted a new ransomware-based campaign dubbed ‘Realstatistics’ conducted by threat actors in the past two weeks. “Our Incident Response Team (IRT) has been tracking a mass infection campaign over the […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all let inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Boffins spotted over 100 snooping Tor HSDir nodes spying on Dark Web sites A Chinese gang […]