Breaking News

Pierluigi Paganini April 07, 2016
Anonymous Philippines hacked the COMELEC. It is the biggest government related data breach

Anonymous Philippines hacked the COMELEC database, the incident exposed records of more than 55 million voters, it is the biggest gov-related data breach. A few days ago I reported the news on the availability online of a database containing data of more than 50 million Turkish citizens, now IT security community is discussing another clamorous data […]

Pierluigi Paganini April 07, 2016
TA530 group, spear phishing meets ransomware

A threat actor named TA530 group, has been targeting executives in an attempt to infect their machine with various malware, including ransomware. Ransomware continues to represent one of the greatest threat for the Internet users, the FBI recently issued a confidential urgent “Flash” message to the businesses and organizations about the Samsam Ransomware. Security firms […]

Pierluigi Paganini April 07, 2016
Ubuntu issued a patch to fix a number of Kernel Vulnerabilities

Ubuntu has patched a number of flaws affecting the Linux kernel, it is urging users to apply the patch if they’re running 14.04 LTS or any derivative builds. Ubuntu has patched a number of vulnerabilities affecting the Linux kernel, it is urging users to apply the patch if they’re running 14.04 LTS or any derivative builds. According […]

Pierluigi Paganini April 07, 2016
Italian Government revoked Hacking Team ’s global export license

The government authority who oversees the export of “dual use” technologies revoked the Hacking Team ’s global export license. On July 2015, the Italian surveillance company Hacking Team suffered one of the worst data breaches in the history.  Unknown attackers have exfiltrated some 400Gbs of data, including internal emails, exploit source code and invoices. A few months […]

Pierluigi Paganini April 06, 2016
One Billion WhatsApp Users are now protected by End-to-End Encryption

Whatsapp now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. Great news for privacy advocates and WhatsApp users, the software now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. On Tuesday, the company announced the significant improvement to its 1 billion users with a blog […]

Pierluigi Paganini April 06, 2016
Adobe to patch Flash Player zero-day vulnerability actively exploited in the wild

A new Flash Player zero-day vulnerability (CVE-2016-1019) has been actively exploited by threat actors in attacks against systems running Windows XP and 7. Once again a zero-day vulnerability in the Adobe Flash Player 21.0.0.197 is threatening Internet users worldwide. The news was spread by Adobe that issued a security alert on Tuesday anticipating an imminent […]

Pierluigi Paganini April 06, 2016
How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access […]

Pierluigi Paganini April 06, 2016
Homeland Security – US Consular Consolidated Database vulnerable to cyber attacks

According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD)  database is open to intrusion. According to the results of an internal review of the US State Department, the Consular Consolidated Database (CCD) is vulnerable to cyber attacks. The State Department considers the CCD as an “unclassified but […]

Pierluigi Paganini April 05, 2016
APT6 compromised the US government networks for years

The federal bureau of investigation issued an alert related the APT6 state-sponsored hacking group that has compromised the US Government networks for years. The FBI revealed that “a group of malicious cyber actors have compromised and stolen sensitive information from various government and commercial networks” since at least 2011. The alert was published online by AlenVault […]

Pierluigi Paganini April 05, 2016
Keep Windows machines infected abusing Windows Desired State Configuration (DSC)

Two forensics experts have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the compromised machine. At the last Black Hat Asia, the forensics experts Matt Hastings and Ryan Kazanciyan from Tanium have demonstrated how to abuse the Windows Desired State Configuration (DSC) feature to gain persistence on the compromised machine. The DSC […]