Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in todayâs world is the task of securing their organizationâs assets. While physical security is a huge component in ensuring that the residual risk level existing […]
ESET has discovered a new hacking campaign dubbed Operation Buhtrap based on a family of spyware targeting vulnerabilities within the Russian Windows System. Late in 2014 analysts at ESET uncovered CVE-2012-0158, a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library. This particular malicious code can be activated by a […]
The Beebone botnet has been shut down in a joint operation between U.S. and European law enforcement and a number of private security companies. A new joint operation run by US and European law enforcement and a number of private security firms took down the polymorphic Beebone botnet, also known as AAEH. The operation was […]
Members of the ISIS Cyber Caliphate hacking crew attacked French TV network TV5Monde on Wednesday evening disrupting the broadcast of its TV channels. The French TV Channel TV5Monde was targeted by a serious cyber attack on Wednesday that compromised broadcasting of transmissions across its medium.the attackers also hijacked the Channel TV5Monde website and social media […]
A team or researchers sponsored by the US DARPA has developed a new innovative tool to improve the detection of Android malware. The blue team of DARPA (Defense Advanced Research Projects Agency) backed up by Iowa State University researchers are developing a tool that will help with Android malware analysis. The features used by the […]
The FBI is warning that individuals sympathetic to the ISIS are running mass-hacking websites exploiting known vulnerabilities in WordPress. The FBI is warning administrators of WordPress websites about the possibility of cyber attacks carried out by sympathizers of the ISIS  terrorist group. Unfortunately, it is quite simple to compromise websites based on the popular content management system (CMS) that […]
Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]
The British television host scored a rare one-on-one interview in Moscow with Edward Snowden for the Sunday’s edition of the “John Oliver Tonight” show. A British channel hosted a rare interview with Snowden in Moscow, the interview was conducted by John Oliver from “John Oliver Tonight.” Aside from jokes like “Do you miss a hot […]
According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]
According to officials at the Federal Aviation Administration (FAA), hackers earlier this year targeted the Agency network with a malware. It’s official, the network of the Federal Aviation Administration (FAA) was targeted early 2015 by unknown hackers. According to FAA officials, the threat actors used a malware to compromise the infrastructure of the agency. “In early February, the FAA […]