WikiLeaks on Thursday published a searchable database of more than 30,000 documents that were obtained by hackers in the cyber attack on Sony Pictures. WikiLeaks organization has leaked online a collection of documents stolen in the Sony Pictures data breach, more than 30,000 files showing the inner workings of a “secretive” firm. WikiLeaks published the […]
Security experts worldwide have discovered that threat actors are exploiting the Microsoft Zero-Day vulnerability MS15-034 in cyber attacks. Security researchers at SANS Internet Storm Center revealed that the critical remote code execution vulnerability MS15-034 affecting the Windows HTTP protocol stack is being actively exploited in the wild. The experts explained that the MS15-034 flaw affects […]
A Government spokesman confirmed the US Government is supporting the growth for its cyber command but it is not yet ready to repel any cyber attacks. The US are among the most advanced countries in Information Warfare, Obama administration considers strategic the dominance of the country in the cyber space. The US Government established in […]
A lawyer who has been dealing with a whistleblower case has claimed that a hard drive used as evidence and sent by the police has infected with spying Trojan. A lawyer from Arkansas is now representing three police officers from Fort Smith at a case of whistleblowers and has now found himself in the middle […]
A group of cyber criminals hacked systems the systems of the France Televisions and have stolen data on 100,000 contacts stored by the French state TV. Another cyber attack hit a French TV, this time the hackers compromised the computers at the network of the broadcaster stealing personal data belonging 100,000 contacts. According to an […]
Google Launches Chrome 42 that deprecates the NPAPI (Netscape Plugin API) due to the numerous problems it caused in the past. Google has released Chrome 42, a version that implements the important choice to exclude any plugin using the API called NPAPI (Netscape Plugin API) to extend browser functionalities. The Netscape Plugin API is dated back 1990 […]
The elite cyber crime group Hellsing strikes back after attack by the rival APT crew known as Naikon. This is the first documented case of APT-on-APT attack. What happens when an APT group running a cyber espionage campaign target a second distinct APT group? The events occurred last year, when a group involved in a cyber espionage campaign […]
A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA) systems. The new Dell Annual Threat Report revealed that the number of attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014 respect the previous year. Unfortunately, the majority of incidents occurred in SCADA systems is […]
A researcher discovered that Belkin implements a vulnerable procedure to generate WPS PINs. Just knowing MAC and the serial number he can calculate it. A security researcher who goes by the name of Craig has discovered a critical flaw affecting Belkin network devices. that could be exploited by attackers to calculate the WPS PINs. In […]
A group of Turkish hackers shut down the official website of the Vatican City to protest against Pope Francesco’ statements on the Armenian Genocide. Turkish hackers have taken down the Vatican City official website for revenge against the recent statements by Pope Francesco on the Armenian genocide. The hacking group named Herakles (@THTHerakles) announced that he will continue the […]