Breaking News

Pierluigi Paganini June 30, 2015
Cyber espionage – Russia and China are targeting British Companies and Others

Ongoing incidents have brought to light the power of both Russia and China in the field of cyber espionage. Their experts have continuously targeted the US and the British, including Governmental sources and esteemed companies. It is no surprise that cyber espionage has been growing larger and larger. Significant players come from Russia and China, […]

Pierluigi Paganini June 30, 2015
Hacked Routers exploited to serve the Dyre banking trojan

Researchers at the Fujitsu Security Operations Center spotted a strain of Dyre being served exploiting hundreds of compromised home routers. According to the popular security expert Brian Krebs, criminals are exploiting a new technique to spread the Dyre banking malware, they are leveraging hacked wireless routers. Dyre is usually downloaded by the malicious trojan Upatre, it […]

Pierluigi Paganini June 29, 2015
Europol coordinated a joint operation against airline fraudsters in 49 countries

On 16 and 17 June the Europol coordinated an international law enforcement operation against airline fraudsters at 140 airports across the world. On 16 and 17 June another joint operation conducted by law enforcement worldwide allowed the arrest of 130 individuals. The authorities operated at 140 airports in 49 countries on five continents, the investigators found the […]

Pierluigi Paganini June 29, 2015
Magnitude exploit kit now include also the CVE-2015-3113

The French researcher Kafeine confirmed that the author of the Magnitude exploit kit have added the code to exploit the Adobe CVE-2015-3113 flaw. Cyber criminals have added the recently the recently discovered CVE-2015-3113 to the popular Magnitude exploit kit. Last week, Adobe released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is […]

Pierluigi Paganini June 29, 2015
Security Researcher found vulnerabilities on the Forbes Website

The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of Forbes and decided to disclose them for educational purpose. Let me introduce myself, I’m a Brazilian Security Information Consultant, you can contact me searching on LinkedIn Rafael Fontes Souza. First I found vulnerabilities in the website of Forbes, and was thinking about […]

Pierluigi Paganini June 29, 2015
Experts found Government Credentials on the Open Web too easily

Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on several paste sites. According to analysts at Recorded Future, the credentials stolen in several data breached related to 100 US government domains are available online on a number of paste sites and on other websites. […]

Pierluigi Paganini June 28, 2015
Popular travel websites warn Customers of Phishing scam

The customers of popular travel websites are targeted by phishing scam in an attempt to lure them into disclosing personal information. The users of popular travel websites are targeted by phishing campaigns in an attempt to lure them into disclosing personal information. The travel websites have issued an alert to inform their customers of fraudulent […]

Pierluigi Paganini June 28, 2015
Security Affairs newsletter Round 15 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Password Recovery Scam – how to hack a Gmail account Signal amplification and brute-force attack for car thieves Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting […]

Pierluigi Paganini June 28, 2015
US Healthcare companies are the most targeted by Stegoloader

The authors of the Stegoloader malware are exploiting digital steganography to target companies worldwide, mainly US Healthcare companies. A couple of weeks ago, the security researchers at Dell SecureWorks discovered a new strain of malware dubbed Stegoloader, that exploits steganography as an evasion technique. Once infected the victim’s machine, a specific loader module loads a PNG file that contains […]

Pierluigi Paganini June 27, 2015
SCADA systems available for sale in the Underground

Security experts have discovered the availability in underground forums of the credentials and other information related to SCADA systems. SCADA (Supervisory Control and Data Acquisitions) systems are the most important components for the control of processes inside a critical infrastructure. A recent report published by Dell revealed a 100 percent increase in the number of attacks on […]