Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the installation process on iOS. A team of researchers at FireEye has revealed that the last update issued by Apple only partially fixed the two vulnerabilities exploited in the Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). The two exploits […]
A look to the “NIT Forensic and Reverse Engineering Report, Continued from January 2015”. NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process […]
Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal Farm APT. Security experts at ESET have analyzed Dino, a sophisticated platform used by the Animal Farm ATP group. Earlier this year, security researchers discovered two powerful malware, dubbed Babar and Casper, likely developed by the […]
The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security flaw. According the results of a security audit conducted after the hack at the US Office of Personnel Management (OPM) the systems of the US Department are affected by a serious vulnerability. The vulnerable system is […]
Ongoing incidents have brought to light the power of both Russia and China in the field of cyber espionage. Their experts have continuously targeted the US and the British, including Governmental sources and esteemed companies. It is no surprise that cyber espionage has been growing larger and larger. Significant players come from Russia and China, […]
Researchers at the Fujitsu Security Operations Center spotted a strain of Dyre being served exploiting hundreds of compromised home routers. According to the popular security expert Brian Krebs, criminals are exploiting a new technique to spread the Dyre banking malware, they are leveraging hacked wireless routers. Dyre is usually downloaded by the malicious trojan Upatre, it […]
On 16 and 17 June the Europol coordinated an international law enforcement operation against airline fraudsters at 140 airports across the world. On 16 and 17 June another joint operation conducted by law enforcement worldwide allowed the arrest of 130 individuals. The authorities operated at 140 airports in 49 countries on five continents, the investigators found the […]
The French researcher Kafeine confirmed that the author of the Magnitude exploit kit have added the code to exploit the Adobe CVE-2015-3113 flaw. Cyber criminals have added the recently the recently discovered CVE-2015-3113 to the popular Magnitude exploit kit. Last week, Adobe released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is […]
The security expert Rafael Fontes Souza has discovered vulnerabilities in the website of Forbes and decided to disclose them for educational purpose. Let me introduce myself, I’m a Brazilian Security Information Consultant, you can contact me searching on LinkedIn Rafael Fontes Souza. First I found vulnerabilities in the website of Forbes, and was thinking about […]
Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on several paste sites. According to analysts at Recorded Future, the credentials stolen in several data breached related to 100 US government domains are available online on a number of paste sites and on other websites. […]