A large number of business websites have been compromised by the SoakSoak gang to deliver ransomware. Security experts from Invincea firm have discovered that a large number of websites were recruited by the SoakSoak botnet to deliver CryptXXX malware. The list of compromised sites is long and includes the tourism website for Guatemala and the do-it-yourself project […]
Today, it is a pleasure for me to interview an Italian colleague, Matteo Meucci, a great professional, a perfect mix of talent and discipline. Enjoy the interview. Hi Matteo, you are one of the most respected Italian experts on cyber security. Could you tell me which his your technical background and when you started hacking? […]
This critical flaw CVE-2016-4631 resides in the ImageIO and could be exploited by a remote attacker to steal sensitive information from Apple devices. Apple fans, I have a bad news for you, just one specially-crafted message can expose your personal information, including your authentication credentials stored in the memory of your Apple device. This means […]
According to the ICO Baby monitors are still open to hackers across the UK, the ICO issued a list of recommendations to avoid privacy breaches. Early this year, the Shodan search engine launched a feature that lets users easily access vulnerable webcams. In September 2015, researchers from the Rapid7 security firm discovered a number of security vulnerabilities affecting several Video […]
A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomware, dubbed cuteRansomware, shows that your enterprise isn’t the only one thinking about cloud transition. Modern day hackers are loving the Cloud too. The cuteRansomware was discovered by Netskope security firm which observes an increase […]
A security expert revealed a number of flaws in the big playerâs two-factor authentication methods that could allow crooks to steal money. Social media bug bounty hunter, Arne Swinnen, has revealed a number of flaws in the big playerâs 2 factor authentication (2FA) methods that could enable a malicious user to illicit large sums of […]
Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in the energy industry Recently, experts from the SentinelOne security firm spotted a sophisticated malware dubbedSFG, a spawn of Furtim malicious code, targeting at least one European energy company. Media speculated the existence of a powerful SFG […]
Colleagues at HackRead discovered a seller using the pseudonym of ‘DataDirect’ offering US voters’ registration records on a black marketplace. On the Dark Web is quite easy to find any kind of data, recent data breaches have literally flooded the principal black markets. Recently, colleagues at HackRead discovered a seller using the pseudonym of ‘DataDirect’ […]
Enjoy the interview with Zeus Anon to understand which phenomena are influencing the cyberspace and how hackers are fighting the ISIS online propaganda. I’m continuing to interview hackers that every day fight against the ISIS supporters, people that live in the shadow that are engaged in hard battles. Enjoy the interview! Hi Zeus, first of […]
Data breaches in the healthcare sector are fueling the dark web, millions of people’s medical records are offered for sale in the dark side of the internet. In the past several years, security pundits have been predicting that the healthcare sector was going to be the hotbed of cyber threat activity. These predictions go back […]