Anomali Labs analyzed attacks against the reputation of FTSE 100 companies highlighting the availability in the Dark Web of employees data. Anomali Labs analyzed attacks against the reputation of FTSE 100 companies highlighting the availability in the Dark Web of employees’ data. Brand spoofing is an illegal practice that causes several damages to companies worldwide, […]
The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is recognized as one of the most active and influential digital advocates and security researchers. He is one of the few reporters to have had a preview of the NSA secret documents leaked by Edward Snowden. The news is […]
The notorious crime forum Sh0ping[.]su has been hacked by unknowns that leaked online credit card data and stolen accounts. Data breaches are a common problem also for bad actors, in many cases cyber criminals hack websites of competitors to damage their reputation and push out them from the business. Recently we discussed the hacks of […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hacking NTP Servers from Long-Distance with low cost devices Why surveillance firm Blue Coat was granted a powerful encryption certificate? Security Affairs newsletter Round 62 – News of the week Highly targeted ransomware campaign hit Swedish Telia […]
More than 19 months after its public disclosure the CVE-2014-3704 is still exploited in attacks against Drupal-based websites. It was October 2014, when Drupal patched a critical SQL injection vulnerability (CVE-2014-3704) that was affecting all Drupal core 7.x versions up to the recently-released 7.32 version, which fixed the issue. The patch issued by Drupal fixed the […]
A group of Israeli researchers demonstrated how to steal RSA encryption keys through a PC’s noises during cryptographic operations. If you think that air-gapped networks are totally secure you are wrong, in the past, many research teams have devised methods to steal data from computers disconnected from the Internet. They demonstrated that it is possible […]
Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration technique. Security experts at Trend Micro have spotted a new strain of PoS malware dubbed FastPOS that is able to quickly exfiltrate harvested data. The malware was used by threat actors to target both enterprises and SMBs […]
Lion Caliphate, of Caliphate Cyber Army (CCA) and United Cyber Caliphate (UCC) notoriety, briefly left Facebook last week but returned as Lion Back. Lion Caliphate, of Caliphate Cyber Army (CCA) and United Cyber Caliphate (UCC) notoriety, briefly left Facebook last week but returned with a new name– Lion Back. Site Intel Group, which tracks numerous hacker […]
GhostShell is back and leaked 36 million records from vulnerable networks to invite experts to pay attention to the new MEAN Stack. GhostShell is back and once again to warn us about the poor security posture of many services, this time, he announced to have leaked 36 million accounts/records. The hacker is inviting experts to pay attention to […]
New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public through an […]