Breaking News

Pierluigi Paganini October 11, 2015
Security Affairs newsletter Round 30 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Bogus PayPal App used to spread a banking Trojan Who is the unknown buyer that bought Adblock Extension IT Security in SMEs: Guidelines published by UNICRI Hacking drones by […]

Pierluigi Paganini October 11, 2015
China arrested hackers responding to a US Government request

For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that Chinese authorities have arrested hackers in China following a request of the US Government. Two weeks, before the visit of the Chinese President Xi Jinping in the […]

Pierluigi Paganini October 11, 2015
The Dark web – Why the hidden part of the web is even more dangerous?

Cyber Threat Summit 2015 – Study on criminal activities in the dark web.  “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]

Pierluigi Paganini October 11, 2015
The Dow Jones firm confirmed data breach of 3,500 Users

The Dow Jones firm confirmed to have suffered a data breach, payment card and contact info for less than 3,500 users have been exposed. At the end of the last week, the CEO of Dow Jones & Co disclosed a data breach affecting 3,500 people in a letter to customers. Dow Jones is a media company owned […]

Pierluigi Paganini October 10, 2015
Cost of Breaking SHA-1 decreases due to a new Collision Attack

A group of researchers has demonstrated that the cost of breaking the SHA-1 hash algorithm is lower than previously estimated. The SHA-1 is still one of the most used cryptographic hash algorithm, but bad news for its supporters, a New Collision Attack Lowers Cost of Breaking it. The news is worrying, the cost and time […]

Pierluigi Paganini October 10, 2015
Netgear Router Exploit in the wild

A security researcher has discovered a serious vulnerability in Netgear router that could be exploited by attackers to change the DNS settings. Once again the NetGear Routers are in the headlines for a serious security issue, nearly 500o devices are exposed to DNS Monitoring. The security researcher Joe Giron has discovered a serious vulnerability in Netgear router […]

Pierluigi Paganini October 10, 2015
Sanmay Ved who bought Google.com donates Google reward to charity

After acknowledging the problem that allowed the purchase of the google.com domain for $12, Google rewarded Sanmay Ved with an unknown amount of cash, but the generous man donated it. A few days ago I wrote about an incredible story of a man that bought the google.com and remained its owned for a few minutes. […]

Pierluigi Paganini October 10, 2015
Brute-Force amplification attacks on WordPress rely on XML-RPC

Security experts at Sucuri have uncovered threat actors abusing an XML-RPC method to run Brute-Force amplification attacks on WordPress websites. According to the experts at security firm Sucuri, threat actors are exploiting the XML-RPC protocol implemented by WordPress and other popular content management systems to run brute-force amplification attacks. The XML-RPC protocol allows users to […]

Pierluigi Paganini October 09, 2015
Time to update your Veeam to fix a VeeamVixProxy Vulnerability

The vulnerability allows a local unprivileged user of a Windows guest to gain Local and/or Domain Administrator access when VeeamVixProxy is active, the de-facto default in VMWare and Hyper-V environments. Pasquale `sid` Fiorillo, Francesco `ascii` Ongaro from ISGroup, an Italian Security firm, and Antonio `s4tan` Parata from ush team, have just released a critical security […]

Pierluigi Paganini October 09, 2015
Bad actors target entities worldwide via Cisco WebVPN

Experts at Volexity discovered a hacking campaign targeting the CISCO WebVPN VPN product, attackers aim to steal corporate login credentials. A virtual private network (VPN) allows to extend a private network across a public connection, they are mainly used to protect users’ privacy and improve security for data in transit. Virtual Private Networks are commonly used many companies and organizations […]