Researchers spotted a massive ransomware campaign in which the threat actors developed a new intriguing evasion detection technique. A new and massive ransomware operation dubbed “Operation Kofer” was discovered by a team of Cybereason Labs researchers. This campaign generates new variants of the same malware in order to evade detection and becoming APT-grade in their […]
OpenSSL Foundation fixed a critical issue that impacts any application that uses the popular crypto library in the authentication processes. OpenSSL Foundation has issued a security update as announced weeks ago. The patch just released fixes a mysterious security flaw affecting the OpenSSL code library, in the last weeks, the details of the vulnerability weren’t disclosed […]
After revelations in June about the hack to the US Office of Personnel Management (OPM), now it’s time to clarify and explain the extent of the data breach. After the disclosure in June about the hack to the US Office of Personnel Management (OPM), now was time to clarify and explain the extent of the […]
Patriot missile systems stationed in Turkey near the Syrian Border were briefly taken over by hackers according to the Behorder Spiegel magazine According to the Behorder Spiegel magazine, hackers were able to send “unexplained” orders to the Patriot missiles stationed in Turkey. The Patriot missiles are part of the anti-aircraft system, the systems are manufactured in […]
Security experts at Trend Micro revealed that one of the exploits discovered in the Hacking Team package tied to Attacks In Korea and Japan. Following the recent hack of the popular surveillance firm Hacking Team, the experts started the analysis of the material leaked online by the attackers. The package leaked online include also a number […]
Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that’s why hackers love it! In 2009 John Matherly introduced the Shodan search engine, and at the time the media commented this with doubts and suspicion. Shodan indexes the information related devices exposed on the internet in the same way […]
Trading was halted for more than two hours on the NYSE floor, contemporary United Airlines system and the Wall Street Journal suffered a temporary outage. The scenario could appear apocalyptic, yesterday trading was halted for more than two hours on the New York Stock Exchange (NYSE) floor and at the same time United Airlines and the […]
Morpho is the name of a financially motivated espionage group that targets large enterprises, including Microsoft, Apple, Twitter, and Facebook. Security experts have discovered and analyzed the activities of a financially motivated APT group, dubbed Morpho and Wild Neutron, that has targeted a large number of high profile companies worldwide. According to the analysis published by […]
Security experts confirmed that Adobe Flash vulnerability revealed in the recent attack against the Hacking Team is being used in the wild. Every IT security website is publishing information related to the recent hack of the Hacking Team and consequent exfiltration of more than 400 GB of sensitive data. The most scaring scenario is already […]
According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]