Breaking News

Pierluigi Paganini August 03, 2019
DRAGONBLOOD flaws allow hacking WPA3 protected WiFi passwords

Dragonblood researchers found two new weaknesses in WPA3 protocol that could be exploited to hack WPA3 protected WiFi passwords. passwords. A group of researchers known as Dragonblood (Mathy Vanhoef and Eyal Ronen)devised new methods to hack WPA3 protected WiFi passwords by exploiting two new vulnerabilities dubbed Dragonblood flaws. We first met this team of experts […]

Pierluigi Paganini August 03, 2019
SystemBC, a new proxy malware is being distributed via Fallout and RIG EK

Researchers at Proofpoint discovered SystemBC, a new strain of proxy malware that is being distributed via Fallout and RIG Exploit Kits A new piece of malware dubbed SystemBC was discovered by experts at Proofpoint, it is being distributed via exploit kits like Fallout and RIG. The malware was tracked as “SystemBC” based on the URI path […]

Pierluigi Paganini August 02, 2019
Nation-state actor uses new LookBack RAT to target US utilities

Experts warn of a phishing campaign targeting US companies in the utility sector aimed at infecting systems with a new LookBack RAT. Security experts at Proofpoint uncovered a phishing campaign targeting US companies in the utility sector aimed at infecting systems with a new LookBack RAT. “Between July 19 and July 25, 2019, several spear-phishing […]

Pierluigi Paganini August 02, 2019
How to Reverse Engineer, Sniff & Bruteforce Vulnerable RF Adult Toys with WHID Elite

Expert Luca Bongiorni was looking for new targets to test WHID Elite’s Radio Hacking capabilities and found an interesting one: Electrocuting Cock Ring Last week I was looking for new targets to test WHID Elite’s Radio Hacking capabilities and suddenly I found an interesting one: an Electrocuting Cock Ring. Yes, you read it correctly (What you cannot find […]

Pierluigi Paganini August 02, 2019
Lotsy group targets Italian and Spanish-speaking users

Group-IB discovered massive fraudulent campaigns carried out by Lotsy group involving the use of dozens of well-known brands aimed at Italian and Spanish-speaking customers. Group-IB, an international company that specializes in preventing cyberattacks, which has recently opened Global HQ in Singapore, has discovered a new wave of massive fraudulent campaigns involving the use of dozens […]

Pierluigi Paganini August 02, 2019
Facebook dismantled influence campaigns focused on Middle East and Northern Africa

Facebook announced it dismantled covert influence campaigns in some countries in the Middle East and Northern Africa, including one tied to the Saudi government. Facebook uncovered two separate influence campaigns, one originated in the United Arab Emirates and Egypt, and another in Saudi Arabia. The campaigns appeared to be distinct and involved “coordinated inauthentic behavior” […]

Pierluigi Paganini August 01, 2019
Cyber Defense Magazine – August 2019 has arrived. Enjoy it!

Cyber Defense Magazine August 2019 Edition has arrived. We hope you enjoy this month’s edition
packed with over 205 pages of excellent content. Our Growing Media Platforms… www.cyberdefenseawards.comwww.cyberdefensemagazine.comwww.cyberdefenseradio.comwww.cyberdefensetv.com After 7 Years, We’ve Completely RebuiltCyberDefenseMagazine.com – Please Let Us Know What You Think.  It’s mobile and tablet friendly and superfast.  We hope you like it.  In addition, we’re […]

Pierluigi Paganini August 01, 2019
Recently discovered Hexane group targets the oil and gas industry

Security researchers at Dragos Inc have tracked the activity of a threat actor recently discovered and dubbed Hexane. Security experts at Dragos Inc. have discovered a new threat actor, tracked as Hexane, that is targeting organizations in the oil and gas industry and telecommunication providers. The Hexane group has been active since at least the […]

Pierluigi Paganini August 01, 2019
New Mirai botnet hides C2 server in the Tor network to prevent takedowns

Researchers at Trend Micro have discovered a new Mirai Botnet that has command and control server in the Tor network to make takedowns hard. Experts at Trend Micro have discovered a new Mirai Botnet that uses a Command and Control hidden in the Tor Network, a choice that protects the anonymity of the operators and […]

Pierluigi Paganini August 01, 2019
MICROCHIPS Act aims at improving tech supply chain

MICROCHIPS Act (S. 2316) – Two US Senators have introduced a bill to protect US government supply chain against foreign sabotage and cyber espionage. Two US senators have introduced legislation a bill, dubbed Manufacturing, Investment and Controls Review for Computer Hardware, Intellectual Property and Supply ACT (MICROCHIPS Act – S. 2316) that aims at protecting […]