Security experts at Proofpoint have discovered a new phishing campaign that exploits a Dridex variant that evades detection with AutoClose function. Criminal crews behind the Dridex banking malware are very prolific and are improving the popular malicious code. Recently we have discussed about a Dridex variant which was spread through phishing messages with Microsoft Office documents embedding malicious macros. The attackers exploited social engineering technique to lure […]
A cell of the ISIS has called on its members and backers in the US to kill 100 service members whose names, photos and addresses it posted online. The ISIS continues to scare the West, its operations are supported by a very aggressive media campaign that shares proclamations and recruit new followers in the name […]
Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against hackers. “Findings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to […]
Cisco Security Team has spotted in the wild a new Point-of-Sale malware dubbed PoSeidon that is more sophisticated than previously detected PoS malware. Expert at Cisco have discovered a new Point-of-Sale (PoS) malware dubbed PoSeidon. The experts have discovered many similarities with the popular Zeus Trojan and use sophisticated methods to find card data respect other POS malware like BlackPoS, which was used […]
A developed has discovered that just visiting a page including an unicode string of 13 characters it is possible to crash Mac Chrome tab. While at last pwn2own hacking competition security experts have demonstrated that is quite easy to hack major browsers, another bad news is circulating online for Apple users using Chrome, a sequence of […]
Qualys announced the availability of free assessment SSL Labs APIs and a tool that could be used by users to automate SSL vulnerability testing for websites. The Qualys security firm recently created the Qualys SSL Labs that provided a free tool to conduct free assessment by using its APIs and a new tool that enable SSL […]
At the Pwn2Own hacking competition two researchers hacked the four major browsers, Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Safari. Two researchers on Thursday successfully hacked the four major browsers, Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Apple Safari, at the Pwn2Own, the annual hacking contest in Vancouver. In particular the Korean researcher […]
Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor group known as Rocket Kitten. Security experts at Trend Micro have uncovered a new cyber espionage campaign that is targeting a number of European organisations and businesses. The attackers run a spear phishing campaign that […]
China has admitted the existence in its military organization of special information warfare units, I contacted one of the greatest experts for a comment. Bill Hagestad (Red-DragonRising @RedDragon1949) is a consultant, speaker and expert on Chinese cyber warfare. He is author of 21st Century Chinese Cyberwarfare and Chinese Information Warfare Doctrine Development 1994 – 2014 among […]
For the first time China has publicly admitted the existence in its military organization of special information warfare units. Since quite some time that security experts sustain that China has one of the most advanced cyber army that is responsible for carried some of the highest profile cyber-attacks, but the Government of Beijing China always […]