Talos has developed a Python script for customers to scan their own network to identify routers that may have been compromised by the SYNful_Knock hack. A couple of weeks ago I published the news of the SYNful_knock security issue involving CISCO routers. CISCO issued an alert to warn enterprise customers about a spike in attacks in which hackers use […]
Apple recently released its first update to the new iOS 9, but experts noticed that it doesn’t fix the lock screen bypass vulnerability. Apple has already released its first update for the release iOS, the version iOS 9.0.1 was issued last week to fix a number of bugs. Last week Jose Rodriguez reported the lock screen bypass vulnerability affecting […]
Hilton Worldwide has issued an official statement informing its customers that the alleged data breach is currently under investigation. As reported by Brian Krebs of Krebs on Security, several sources are claiming that Point-of-Sale (PoS) registers utilized by several businesses operating within a large quantity of Hilton Hotel and franchise properties across the United States. These claims result from the […]
A new collection of GCHQ’s documents published by The Intercept reveals how the British Agency tried to track Web visits of âevery visible user on Internetâ A new revelation made by The Intercept confirms that the UK Government Communications Headquarters (GCHQ) has conducted  a massive online surveillance starting from the 2007. The documents accessed by The Intercept detailed an operation […]
The last threat discovered by security experts at Proofpoint is âGreenDispenser,â a malware that presents many similarities with the Tyupkin malware. The use of malicious code to hack ATM is even more common in the criminal ecosystem, in the past security experts have discovered several strain of malware that was designed with this intent. ATM […]
The MotherBoard news website recently published an interesting analysis on how the US Military Fails to Protect its Soldiers’ Emails, how is it possible? After the Edward Snowden case blown up in the US Government face, the US decided to create a task force to encrypt all that can, urging the adoption of HTTPS for […]
Michael Horowitz from Computerworld discovered an application called “Lenovo Customer Feedback Program 64,” which is used to gather customers feedback data. Once, two, three … this is the third time that security experts discover a spyware pre-installed on Lenovo laptops and workstations, and also in this case without the knowledge of its millions of users. […]
According to a new report the popular Naikon APT group is actually backed by China’s PLA Unit 78020, a firm traced it through online activity. Ge Xing, also known as âGreenSky27,â is the name of an alleged member of the Peopleâs Liberation Army unit 78020, a group of Chinese state-sponsored hackers. The man was identified […]
Rumors on the Internet are linking the attack based in XcodeGhost to operations conducted by the CIA (Central Intelligence Agency). A few days ago principal security firm reported the first major cyber attack on the official Apple App Store, thousands of legitimate applications were infected by the XCodeGhost Malware. Apple announced it is cleaning up the […]
Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their offer in the Dark Web. Stolen data is a precious commodity […]