Breaking News

Pierluigi Paganini April 13, 2015
APT30 behind a long-running cyber espionage campaign

Researchers at FireEye uncovered a new threat actor dubbed APT30 that run a decade-long cyber espionage campaign backed by the Chinese Government. Security experts at FireEye have uncovered a new long-running cyber espionage campaign, the researchers speculate that the campaign is active since at least 2005. The threat actor behind the campaign was dubbed APT30 by the researchers, […]

Pierluigi Paganini April 13, 2015
Hackers took over social media accounts of Iranian state Al Alam TV

Unknown hackers took over social media accounts of Iranian state Al Alam TV spreading fake news of the death of an Iran-allied rebel leader in Yemen. The Iranian Arabic-language state TV network Al Alam announced that its Twitter account had been hacked on Sunday. The attackers abused the account to spread a false report to post […]

Pierluigi Paganini April 12, 2015
Security Affairs newsletter Round 4 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Firefox 37 arrives with Opportunistic Encryption support Google Internet Authority G2 has become untrusted due to an expired certificate Security Affairs newsletter Round 3 – Best of the week […]

Pierluigi Paganini April 12, 2015
Darwin kernel, just an IP packet to cause the crash of Apple devices

A serious flaw affecting the Darwin kernel in the Apple OS X 10.10 and iOS 8 could be exploited to cause DoS attack just sending a specific IP packet. At the end of 2014, security experts at Kaspersky Lab discovered a serious vulnerability in the Darwin kernel. The name “Darvin kernel” is unknown to the […]

Pierluigi Paganini April 12, 2015
How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. Early detection of a data breach is crucial to limit the data exposure, unfortunately sometimes they are necessary many months before a breach is detected by security experts. To […]

Pierluigi Paganini April 11, 2015
Lufthansa customers were targeted by a cyber attack

Unknown hackers have gained access to the user personal accounts of the website of Lufthansa airline (LH.com) and used frequent-flyer miles. Unknown hackers have breached the system of the German flag carrier Lufthansa, the news was reported first by the German magazine Der Spiegel. The attackers accessed individual passenger accounts on the company’s website LH.com as […]

Pierluigi Paganini April 11, 2015
Fake NYPD Badges available for sale on dark web

Experts at Trustev discovered on the Nucleus black market lifetime subscriptions to popular streaming services and fake NYPD badges. In the last months, we have assisted numerous operations run by law enforcement against illegal activities in the dark web, in particular against the numerous black markets that sell any kind of product and services. Everyone could […]

Pierluigi Paganini April 11, 2015
A Closer Look at the Dridex Trojan After Some Recently Received E-mails

The security Expert Michael Fratello provide us a closer look at the Dridex Trojan following its investigation on the malicious agent. The Dridex Banking Trojan is a part of a family of Trojans classified as “banking trojans“.  An article describing the Dridex Trojan and some of its inner-workings were published by TrendMicro in November of 2014. […]

Pierluigi Paganini April 11, 2015
Great Cannon, the powerful Chinese hacking platform

Researchers uncovered the Great Cannon, a powerful hacking tool, used by the Chinese Government to run MITM attacks, that was used also against GitHub. The researchers from the University of California at Berkeley and the University of Toronto have uncovered a powerful weapon of the Chinese Government cyber arsenal, dubbed the Great Cannon, used to […]

Pierluigi Paganini April 10, 2015
Did the attackers hack TV5Monde with the Kjw0rm Remote Access Trojan?

A new hypothesis on the attack that compromised the French TV station TV5Monde: Hackers of the Cyber Caliphate team used the Kjw0rm Remote Access Trojan. The cyber attacks against the French TV5Monde Channel that resulted in the network take over and the hijacking of social media account of the broadcaster is focusing the attention of the media. […]