In the UK hard times for messaging applications like WhatsApp and Facebook Messenger, the Investigatory Powers Bill, probably will pass in Autumn. We have already discussed the plan of the UK Government to ban principal messaging applications for security reason, the authorities fear that they could be exploited by terrorist groups as a communication channel. Early this […]
According to the experts at Volexity the Flash Player exploit has been leveraged in spear phishing campaign launched by the Wekby APT. As anticipated, several criminal gangs included the code for the exploitation of CVE-2015-5119 vulnerability in their exploit kits, let’s remember that the exploits code was disclosed as the result of the attack against the Hacking […]
Researchers spotted a massive ransomware campaign in which the threat actors developed a new intriguing evasion detection technique. A new and massive ransomware operation dubbed âOperation Koferâ was discovered by a team of Cybereason Labs researchers. This campaign generates new variants of the same malware in order to evade detection and becoming APT-grade in their […]
OpenSSL Foundation fixed a critical issue that impacts any application that uses the popular crypto library in the authentication processes. OpenSSL Foundation has issued a security update as announced weeks ago. The patch just released fixes a mysterious security flaw affecting the OpenSSL code library, in the last weeks, the details of the vulnerability weren’t disclosed […]
After revelations in June about the hack to the US Office of Personnel Management (OPM), now it’s time to clarify and explain the extent of the data breach. After the disclosure in June about the hack to the US Office of Personnel Management (OPM), now was time to clarify and explain the extent of the […]
Patriot missile systems stationed in Turkey near the Syrian Border were briefly taken over by hackers according to the Behorder Spiegel magazine According to the Behorder Spiegel magazine, hackers were able to send “unexplainedâ orders to the Patriot missiles stationed in Turkey. The Patriot missiles are part of the anti-aircraft system, the systems are manufactured in […]
Security experts at Trend Micro revealed that one of the exploits discovered in the Hacking Team package tied to Attacks In Korea and Japan. Following the recent hack of the popular surveillance firm Hacking Team, the experts started the analysis of the material leaked online by the attackers. The package leaked online include also a number […]
Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that’s why hackers love it! In 2009 John Matherly introduced the Shodan search engine, and at the time the media commented this with doubts and suspicion. Shodan indexes the information related devices exposed on the internet in the same way […]
Trading was halted for more than two hours on the NYSE floor, contemporary United Airlines system and the Wall Street Journal suffered a temporary outage. The scenario could appear apocalyptic, yesterday trading was halted for more than two hours on the New York Stock Exchange (NYSE) floor and at the same time United Airlines and the […]
Morpho is the name of a financially motivated espionage group that targets large enterprises, including Microsoft, Apple, Twitter, and Facebook. Security experts have discovered and analyzed the activities of a financially motivated APT group, dubbed Morpho and Wild Neutron, that has targeted a large number of high profile companies worldwide. According to the analysis published by […]