Breaking News

Pierluigi Paganini October 25, 2015
How to hack airbag in Audi TT on other models

Researchers demonstrated how disable the airbags on a Audi TT (and others models) and other functions by exploiting a zero-day flaw in third-party software. Lately, many researchers proved that car manufacturers haven’t addressed security vulnerabilities in modern vehicles properly and use of lots of embedded controllers and providing different external interfaces made it possible to […]

Pierluigi Paganini October 25, 2015
Germany probes alleged new case of US espionage: Regin malware infected Gov laptop

The German authorities have launched a probe into allegations of a new case of US espionage after they have found a laptop infected by the Regin Spyware. The German authorities have launched a probe into allegations of a new cyber-espionage campaign that is suspected to be linked to the US intelligence. The news was revealed […]

Pierluigi Paganini October 24, 2015
TalkTalk announced hackers have stolen ‘incomplete’ customer bank data

Hackers that recently breached the systems at TalkTalk IPS have stolen ‘incomplete’ customer bank data, states an official announcement issued by the firm. This week the TalkTalk Telecom Group plc has publicly disclosed that four million subscribers  have been impacted by a “sustained cyberattack” that hit its servers. On Friday, the TalkTalk CEO Dido Harding confirmed personally […]

Pierluigi Paganini October 24, 2015
You need just $8,000 to exploit a zero-day in a critical infrastructure

How much cost a zero-day for an industrial control system? Where is to possible to buy them and who are the main buyers of these commodities? We have discussed several times about the importance of zero-day in cyber attacks against computer systems, the exploitation of previously unknown vulnerabilities is a prerogative of well-funded hacking groups such as state-sponsored crews. […]

Pierluigi Paganini October 24, 2015
How to improve Internet security after the disclosure of the Diffie-Hellman flaw

Now that it is known a critical flaw in the Diffie-Hellman key-exchange protocol was exploited by the NSA to break the internet encryption, how to stop it? Recently a group of researchers has revealed how the NSA has cracked HTTPS, SSH, and VPNs rely on the Diffie-Hellman encryption by exploiting a wrong implementation of the cryptographic algorithm. The […]

Pierluigi Paganini October 24, 2015
TalkTalk CEO confirmed personally receiving a ransom demand

The CEO of TalkTalk confirmed personally receiving a ransom from the alleged attackers, a Russian Islamist group claimed the responsibility of the attack. TalkTalk Telecom Group plc has publicly disclosed that four million subscribers have been impacted by a “sustained cyberattack” that hit its servers. The TalkTalk CEO Dido Harding has now confirmed personally receiving a […]

Pierluigi Paganini October 23, 2015
New Joomla release patches a serious SQLi flaw

Joomla just released a patch to fix a critical vulnerability that can allow an attacker to get full administrative access to a website. The new version of the popular Joomla content management system, the Joomla 3,4,5, is available online. The new release fixes a critical SQL injection vulnerability that could be exploited by attackers to […]

Pierluigi Paganini October 23, 2015
Pawn Storm APT targets MH17 crash investigation

The Pawn Storm APT group set up rogue VPN and SFTP servers to target Dutch Safety Board employees involved in the MH17 crash investigation. July 17, 2014, Flight MH17, traveling from Amsterdam to Kuala Lumpur, was shot down by a missile in mysterious circumstances. Flight MH17 was flying over a conflict zone in eastern Ukraine […]

Pierluigi Paganini October 23, 2015
Crooks are hacking CCTV Cameras to launch severe DDoS attacks

Imperva has discovered that attackers hijack CCTV cameras to launch powerful DDoS attacks exploiting weak credentials and poor configurations of IoT devices. Internet of Things devices are becoming privilege targets of threat actors that daily abuse of their resources to run cyber attacks or to organize frauds or to spy on unaware users. Unfortunately, most IoT devices […]

Pierluigi Paganini October 23, 2015
TalkTalk data breach, hackers compromised 4 million customer records

The British Internet Service Provider TalkTalk discloses possible breach and admits some data are not encrypted. The investigation is still ongoing. Another illustrious victim of a data breach is in the headlines, TalkTalk Telecom Group plc has announced that four million subscribers may have been impacted by a “sustained cyberattack” that hit its servers. TalkTalk Telecom […]