Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The recently issued Imperva’s Hacker Intelligence Initiative report on Man-in-the-Cloud (MITC) attacks details how threat actors abuse popular cloud storage services for illegal activities. The experts have analyzed a number of cloud storage services including Dropbox, Google Drive, Box, and Microsoft OneDrive. […]
Trend Micro revealed that Android users are threatened by another vulnerability coded as CVE-2015-3823 which traps mobile phones in endless reboots. Still problems for Android users! A few days ago security experts at Trend Micro discovered a serious flaw in Android OS that can be exploited to crash mobile devices, just before it was announced the Stagefright […]
Apple’s iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool released by the Chinese jailbreaking team TaiG Apple’s iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool released by the Chinese jailbreaking team TaiG. Quite […]
A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking platform. According RSA Security, a China-based virtual private network (VPN) service provider offers hacking crews a network of compromised servers which can be used to carry out stealth cyber attacks. The attacks appear to be […]
A security researcher developed an improved version of the Thunderstrike rootkit that uses Thunderbolt accessories to infect the Mac firmware. Earlier this year, security expert Trammell Hudson presented a proof-of-concept firmware called Thunderstrike. Thunderstrike is a hacking technique to infect Appleâs Mac PCs with EFI Bootkit through the Thunderbolt port. The expert demonstrated how to compromise […]
The CTB-Locker Ransomware is Back with a Vengeance, the security experts noticed that bad actors Leveraging the Release of Windows 10 as an Attack Vector. A false sense of hope that the presence, or rather the active spread, of crypto-ransomware in-the-wild has begun to slowly die out has been quickly diminished thanks to the group behind the CTB-Locker ransomware. While […]
Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces. Cybercrime becomes even more sophisticated and explores new technologies for its illegal activities. A growing problem for law enforcement agencies world worldwide is to track illegal activities in the Dark Web. Not only cyber criminals, but also groups […]
Recently we reported a new vulnerability affecting Bind, now experts at Sucuri confirmed that the flaw is being exploited in DNS server attacks. A few days ago we wrote about the BIND software flaws that were discovered, affecting important companies, and last week a patch was released for the denial-of-service flaw (CVE-2015-5477), which was affecting […]
Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than 1.3 million PC worldwide. Early 2015, part of the source code for the 2.0 version of the RIG exploit kit was leaked online due to a dispute between the main developer and a reseller. According […]
The NBC News published a secret NSA map reporting the locations of âVictims of Chinese Cyber Espionage” attacks that resulted in data thefts. The NBC News has published in exclusive a secret NSA map showing the locations of the cyber attacks carried out by Chinese hackers over a five-year period. Every marker in the secret NSA map […]