Breaking News

Pierluigi Paganini August 06, 2015
Funtenna can remotely steal data from air-gapped network using sound waves

A group of researchers has presented at the Black Hat conference Funtenna, a hacking technique to steal data from air-gapped network based on sound waves. Imagine, If a remote hacker could steal classified information from a targeted computer without having to physically and Internet access to it. A team of security researchers has demonstrated how […]

Pierluigi Paganini August 06, 2015
ICANN urges passwords reset due an external service provider breach

The ICANN has issued a warning to inform who registered with ICANN.org that their profile accounts were accessed by an “unauthorized person.” The Internet Corporation for Assigned Names and Numbers (ICANN) has issued another security warning after login credentials of the ICANN.org website have been compromised. A new incident occurred to the ICANN (Internet Corporation for […]

Pierluigi Paganini August 06, 2015
The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from victims. An alleged Chinese APT group dubbed Panda Emissary (also known as TG-3390) is targeting high-profile governments and organisations searching for defense aerospace projects. Researchers at Dell discovered that the Panda Emissary group used Watering hole […]

Pierluigi Paganini August 06, 2015
Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The recently issued Imperva’s Hacker Intelligence Initiative report on Man-in-the-Cloud (MITC) attacks details how threat actors abuse popular cloud storage services for illegal activities. The experts have analyzed a number of cloud storage services including Dropbox, Google Drive, Box, and Microsoft OneDrive. […]

Pierluigi Paganini August 05, 2015
CVE-2015-3823 Android bug phones in endless reboots

Trend Micro revealed that Android users are threatened by another vulnerability coded as CVE-2015-3823 which traps mobile phones in endless reboots. Still problems for Android users! A few days ago security experts at Trend Micro discovered a serious flaw in Android OS that can be exploited to crash mobile devices, just before it was announced the Stagefright […]

Pierluigi Paganini August 05, 2015
TaiG Jailbreak for Mac, tool for jailbreaking iOS 8.4 (Mac OS X version) Released

Apple’s iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool released by the Chinese jailbreaking team TaiG Apple’s iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool released by the Chinese jailbreaking team TaiG. Quite […]

Pierluigi Paganini August 05, 2015
Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking platform. According RSA Security, a China-based virtual private network (VPN) service provider offers hacking crews a network of compromised servers which can be used to carry out stealth cyber attacks. The attacks appear to be […]

Pierluigi Paganini August 05, 2015
Thunderstrike 2 rootkit infects Mac firmware

A security researcher developed an improved version of the Thunderstrike rootkit that uses Thunderbolt accessories to infect the Mac firmware. Earlier this year, security expert Trammell Hudson presented a proof-of-concept firmware called Thunderstrike. Thunderstrike is a hacking technique to infect Apple’s Mac PCs with EFI Bootkit through the Thunderbolt port. The expert demonstrated how to compromise […]

Pierluigi Paganini August 04, 2015
The CTB-Locker Ransomware is Back with a Vengeance: Windows 10 Social Engineering

The CTB-Locker Ransomware is Back with a Vengeance, the security experts noticed that bad actors Leveraging the Release of Windows 10 as an Attack Vector. A false sense of hope that the presence, or rather the active spread, of crypto-ransomware in-the-wild has begun to slowly die out has been quickly diminished thanks to the group behind the CTB-Locker ransomware. While […]

Pierluigi Paganini August 04, 2015
Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces. Cybercrime becomes even more sophisticated and explores new technologies for its illegal activities. A growing problem for law enforcement agencies world worldwide is to track illegal activities in the Dark Web. Not only cyber criminals, but also groups […]