Breaking News

Pierluigi Paganini May 28, 2018
MalHide Malware uses the compromised system as an eMail relay

The cybersecurity experts Marco Ramilli analyzed a new sample of malware dubbed MalHide that implements a quite new attack path to use the compromised system as eMail relay in order to hide the attacker networks. Today I’d like to share an interesting (at least to me) analysis on a given sample. I have called this sample MalHide but […]

Pierluigi Paganini May 28, 2018
Hackers defaced screens at Mashhad airport in Iran protesting the government

On Thursday 24th May, hackers defaced the screens at the Mashhad airport in Iran to protest Ăčthe Government and the military’s activities in the Middle East. On Thursday 24th May, hackers defaced the screens at the airport in Mashhad city in Iran.  The anonymous group of hackers defaced the screens that were displaying anti-government messages, they also […]

Pierluigi Paganini May 28, 2018
Experts noticed an ongoing activity involving the RIG Exploit Kit to deliver the Grobios Trojan

Malware researchers from FireEye recently noticed an interesting ongoing activity involving the infamous RIG Exploit Kit (EK) to deliver the Grobios Trojan. Security experts highlighted several times the decline of the exploit kit activity after the disappearance of the Angler and Nuclear exploit kits in 2016. Anyway, researchers at FireEye periodically observe significant developments in this […]

Pierluigi Paganini May 27, 2018
A bug in T-Mobile site allowed anyone see any customer’s account details

A flaw in T-Mobile’s website allowed anyone to access the personal account details of any customer by providing their mobile number. The bug discovered by the researcher Ryan Stevenson resides in the T-Mobile subdomain promotool.t-mobile.com used by the staff as a customer care portal to access the company’s internal tools. The promotool.t-mobile.com subdomain contained a hidden API that would […]

Pierluigi Paganini May 27, 2018
Security Affairs newsletter Round 164 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online Kindle Edition Paper Copy Once again thank you! ·      Experts propose a new variation of the Spectre attack to recover data from […]

Pierluigi Paganini May 27, 2018
Coca-Cola data breach has affected about 8,000 workers

Coca-Cola discovered a security breach in September when law enforcement officials notified it that a former employee at a Coca-Cola subsidiary was found in possession of an external hard drive containing worker data. Coca-Cola announced a data breach after a former employee was found in possession of worker data on a personal hard drive. In compliance with […]

Pierluigi Paganini May 26, 2018
Experts show how to defeat AMD’s Secure Encrypted Virtualization

German researchers devised a method, dubbed SEVered, to defeat the security mechanisms Secure Encrypted Virtualization implemented by the AMD Epyc server microchips to automatically encrypt virtual machines in memory. The attack could allow them to exfiltrate data in plaintext from an encrypted guest via a hijacked hypervisor and simple HTTP requests to a web server running […]

Pierluigi Paganini May 26, 2018
Pre-installed malware found in 141 low-cost Android devices in over 90 countries

Researchers from Avast the antivirus firm are investigating the discovery of pre-installed malware found in 141 low-cost Android devices in over 90 countries. Security experts from Antivirus firm Avast have discovered a new case of pre-installed malware on low-cost Android devices, crooks injected the malicious code in the firmware of 141 models. The operation is […]

Pierluigi Paganini May 26, 2018
CVE-2018-7783 flaw in Schneider SoMachine Basic can be exploited to read arbitrary files on the targeted system

Schneider Electric issued a security update for its EcoStruxure Machine Expert (aka SoMachine Basic) product that addresses a high severity vulnerability, tracked CVE-2018-7783, that could be exploited by a remote and unauthenticated attacker to obtain sensitive data. “SoMachine Basic suffers from an XML External Entity (XXE) vulnerability using the DTD parameter entities technique resulting in disclosure and […]

Pierluigi Paganini May 25, 2018
More than 100 Million IoT devices potentially exposed to Z-Shave Z-Wave attack

Researchers from Pen Test Partners have conducted an analysis of Z-Wave wireless communications protocol used by millions of IoT devices and discovered that it is vulnerable to cyber attacks. The Z-Wave protocol is widely adopted for home automation, it leverages low-energy radio waves for wireless communications over distances of up to 100 meters (330 feet). The protocol is […]