IOActive has uncovered a number of serious vulnerabilities affecting the Drupal CMS that could be exploited to completely takeover the vulnerable websites. A new vulnerability affecting Drupal could be exploited for code execution and database credentials theft (by Man-in-the-Middle), according to Fernando Arnaboldi, a senior security consultant working in IOActive. Fernando Arnaboldi says that the […]
According to a footage obtained by Sky News, the members of the Islamic State have an R&D lab where engineers prepare sophisticated surface-to-air missiles and hi-tech bombs. According to a footage obtained by Sky News, the members of the Islamic State have sophisticated surface-to-air missiles in their arsenal. Members of the Islamic State are reportedly developing […]
Silent Circle released an update for its Blackphone 1 that fixes a critical flaw in the modem. Silent Circle has released an update for its Blackphone device that fixes several security vulnerabilities, including a flaw in its modem (CVE-2015-6841) that could have been exploited by threat actors to gain full control of the mobile device. […]
The hacking crew Phantom Squad claims responsibility for an alleged DDoS attack that brought down the PlayStation Network. Around 13:00 EST on Monday, The PlayStation Network suffered a major outage worldwide, Sony early confirmed that the network was âexperiencing issuesâ and its status page showed that the problems were affecting all of its major services. Sony […]
Security experts from SCADA StrangeLove group disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems. Recently I wrote about the SCADA StrangeLove research team reporting their study on the level of cyber security implemented in modern railroad systems . Now the SCADA StrangeLove group has published a list of default credentials, dubbed âSCADAPASS,â associated with industrial […]
The US Government issued a final rule implementing the Executive Order 13694. US can apply economic sanctions in response to cyber attacks. According to a final rule published in the Federal Register on the last day of 2015 (Dec. 31, 2015),  US can now apply economic sanctions in response to cyber attacks. The US Government assigned to […]
The zero-day exploit broker Zerodium is offering up to $100,000 to security experts who can provide an exploit for bypassing the Flash heap isolation. Once again, the zero-day exploit trader Zerodium is in the headlines, this time the company is offering $100,000 for the Flash Exploit Mitigation bypass. Adobe announced in December the introduction of several Recently Adobe […]
Hackers cause power outage with the BlackEnergy malware in Ukraine. Is it an Information warfare act? Cyber security of ICS e SCADA systems in the critical infrastructure is essential, these components are a privileged target of cyber criminals and state sponsor hackers. The most popular SCADA attack in the history is the one conducted against control systems […]
The popular security expert Brian Krebs has reviewed a dating scam package offered in the underground by Russians fraudsters. Russians fraudsters have automated the sale of plug-and-play online dating scam packages. As usual happens in these cases, these services are offered on underground websites specialised in online frauds,  crooks promise a response rate of 1.2 percent […]
The Prox Dynamicsâ PD-100 Black Hornet 2 is a tiny drone having the dimension of a flying insect and a lot of advanced features. Drones are privileged instruments of surveillance, we read about vehicles equipped with IR cameras or devices to spy on mobile devices. These vehicles are used by armies, intelligence and law enforcement agencies during their […]