Cyber Crime

Pierluigi Paganini March 02, 2016
Brazilian police arrested Facebook Vice President for Latin America

Brazilian authorities arrested the Facebook Vice President for Latin America accused of ignoring judicial order in drug trafficking investigation. Law enforcement worldwide is increasing their pressure on IT companies for accessing users’ data, while we are discussing the San Bernardino case (aka Apple vs FBI) another news is shocking the industry, Facebook Vice President has been arrested […]

Pierluigi Paganini March 01, 2016
Waiting for a court ruling, a New York Judge rejected FBI request to unlock an iPhone

The federal magistrate Judge James Orenstein has ruled in favor of Apple, rejecting the FBI request to unlock an iPhone. In the last weeks, we have followed the dispute between Apple and FBI regarding the possibility to unlock the iPhone used by one of the San Bernardino shooters. The FBI required Apple to modify the iOS operating system running […]

Pierluigi Paganini March 01, 2016
New HackingTeam OS X RCS spyware in the wild, who is behind the threat?

A new OS X sample of the Hacking Team RCS has been detected in the wild, who is managing it? Is the HackingTeam back? A group of malware researchers has discovered a new strain of Mac malware undetected my most security firm, but more  intriguing is the speculation that the malicious code may have been […]

Pierluigi Paganini February 29, 2016
The new FighterPOS PoS Malware implements worm capabilities

The threat actors behind the FighterPOS PoS malware have added worm capabilities to their malicious code that is now targeting systems in the United States. PoS malware represents a serious threat to several industries, from retail to the hotel industry. During the last twelve months, security experts have discovered a significant number of payment card frauds involving […]

Pierluigi Paganini February 28, 2016
A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]

Pierluigi Paganini February 28, 2016
CTB-Locker for Websites is spreading in the wild

The experts at BleepingComputer reported a new strain of CTB-Locker for Websites, a new ransomware that mainly targets WordPress sites. Ransomware continues to threaten users worldwide, today we discussed German Hospitals paralyzed by the malware.  TeslaCrypt, Cryptowall and Locky are the names of the most popular ransomware that already infected millions machines worldwide. The experts at BleepingComputer reported a new […]

Pierluigi Paganini February 27, 2016
Gemalto Breach Level Index report 2015, what are hackers looking for?

2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per the security firm Gemalto, Government and healthcare have overwhelmed the retail area as most-focused for information breaks. An aggregate of 1,673 information ruptures prompted 707 million information records being traded off worldwide amid 2015, as […]

Pierluigi Paganini February 27, 2016
Ransomware attacks paralyzed at least two German hospitals

New ransomware infections hit Germany hospitals, at least two structures were infected by the dreaded malware. New ransomware infections hit hospitals in Germany, at least two of them were infected by the dreaded malware. According to local reports, the systems at two German hospitals were infected by a ransomware, in a similar way occurred recently at the US Hollywood […]

Pierluigi Paganini February 26, 2016
The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publicly accused the FBI of paying the experts at the Carnegie Mellon University to deanonymize Tor users. The experts at the Tor Project collected information about the […]

Pierluigi Paganini February 25, 2016
Author of the Angler EK integrated recently Silverlight exploit

The security researcher Kafeine confirmed that the authors of the Angler EK have integrated the exploit for a recently patched Microsoft Silverlight vulnerability. Ransomware is becoming one of the most dreaded cyber threats for netizens, security experts noticed a surge in the number of cyber attacks aimed to spread malware like Cryptowall and TeslaCrypt. Exploit kits like the Nuclear EK […]