Breaking News

Pierluigi Paganini August 28, 2015
Xkeyscore: the secret Germany’s deal with the NSA

An agreement between the German intelligence agency BfV and the NSA allows the access to the XKeyscore platform to return of  data on German citizens. The German weekly Die Zeit disclosed documents that reveal how the German Intelligence did a deal with the NSA to get the access to the surveillance platform XKeyscore. Internal documents show that Germany’s domestic intelligence agency, […]

Pierluigi Paganini August 28, 2015
Symantec discovered 49 New Modules of the Regin espionage platform

Symantec revealed the existence of 49 new modules of the Regin espionage platform, a circumstance that suggests that its operators are still active. In November 2014, security experts at Symantec have uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators.  The Regin malware has been around […]

Pierluigi Paganini August 27, 2015
The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes when dealing with US government data. A new set of rules was created by the Department of Defense (DoD) of the US government for how the cloud providers should report the security issues that involve […]

Pierluigi Paganini August 27, 2015
CERT warns of hard-coded credentials in home routers

DSL home routers from a number of vendors contain hard-coded credentials that could allow a hacker to hijack the network devices via telnet services. A bunch of home gateway vendors, presumably sourcing their firmware from the same place, can be hijacked using depressingly common hard-coded logins. Experts from the Carnegie-Mellon CERT discovered that a number of home […]

Pierluigi Paganini August 27, 2015
Ashley Madison, who hacked it? The Krebs’s opinion

Nearly 37 million users of Ashley Madison have been impacted, the popular investigator Brian Krebs has collected clues on the alleged culprit. The popular investigator Brian Krebs sustains to know the culprit of the Ashley Madison hack, which publicly leaked 37 million accounts belonging to the users of the adultery website. Brian Krebs disclosed the Twitter account, […]

Pierluigi Paganini August 27, 2015
GitHub Again Hit by a new DDoS attack

GitHubhit by another major DDoS attack to because Chinese developers have been forced by police to remove projects of tools to circumvent “Great Firewall.” The software collaboration site GitHub was hit by another DDoS on Tuesday morning that made the website unavailable to many users for several hours. The GitHub platform already suffered a major DDoS attack in March, in that […]

Pierluigi Paganini August 26, 2015
PayPal critical Flaw allows to steal all your funds

The expert Ebrahim Hegazy discovered a critical Stored XSS Vulnerability Paypal Critical Vulnerability to steal Users Credit Cards in ClearText format. The popular security expert Ebrahim Hegazy (@Zigoo0) has discovered a critical Stored XSS Vulnerability in “https://Securepayments.Paypal.com” that could be exploited by attackers to steal Paypal users credit card and login credentials … and more!Paypal SecurePayments domain […]

Pierluigi Paganini August 26, 2015
Be aware enterprises, it’s time to block Tor network

A research conducted by the IBM X-Force team reveals that a growing number of cyber attacks against big IT enterprises relies on the Tor network. With the increase of Tor-based attacks, something needs to change, and IBM is advising companies to start blocking Tor. A research conducted by the IBM X-Force team reveals that SQL […]

Pierluigi Paganini August 26, 2015
Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market, it operates entirely through the Tor network. A few days ago a new variant of the popular Zeus banking trojan was offered for sale on the black market, its name is Sphinx. Sphinx code is […]

Pierluigi Paganini August 26, 2015
SysAdmin admin tool AutoIt used in targeted attacks to serve malware

Security experts at Cisco have uncovered a targeted attack leveraging on AutoIt to serve a RAT and other malware by evading detection. Security experts at Cisco uncovered a targeted hacking campaign that leveraged AutoIt to spread RAT and other malware via Word documents. The RATs were used to compromise computer of a small number of organizations. “AutoIt […]