The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who worked on the MEF – Annual Report on Payment Card Frauds No. 5/2015, it has been an honor and a pleasure to be able […]
For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that Chinese authorities have arrested hackers in China following a request of the US Government. Two weeks, before the visit of the Chinese President Xi Jinping in the […]
Cyber Threat Summit 2015 – Study on criminal activities in the dark web.  “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]
The Dow Jones firm confirmed to have suffered a data breach, payment card and contact info for less than 3,500 users have been exposed. At the end of the last week, the CEO of Dow Jones & Co disclosed a data breach affecting 3,500 people in a letter to customers. Dow Jones is a media company owned […]
Security experts at Sucuri have uncovered threat actors abusing an XML-RPC method to run Brute-Force amplification attacks on WordPress websites. According to the experts at security firm Sucuri, threat actors are exploiting the XML-RPC protocol implemented by WordPress and other popular content management systems to run brute-force amplification attacks. The XML-RPC protocol allows users to […]
Experts at Volexity discovered a hacking campaign targeting the CISCO WebVPN VPN product, attackers aim to steal corporate login credentials. A virtual private network (VPN) allows to extend a private network across a public connection, they are mainly used to protect users’ privacy and improve security for data in transit. Virtual Private Networks are commonly used many companies and organizations […]
The findings of the investigation conducted by Uber on the recent security breach raise doubts on the alleged involvement of a competitor, the Lyft. The findings of the investigation conducted by Uber on the recent security breach that exposed details of its drivers, seems to confirm the involvement of a competitor, the Lyft. On May 2014, […]
Learn what Certificates as a Service stand for, discover why Code Signing certificates are a precious commodity and find out how to protect yourself online. A recent phenomenon tracked by IBM Security X-Force researchers is the CaaS (Certificates as a service). Cybercriminals would use the Dark Web for selling high-grade code certificates -which they have […]
Researchers at FireEye spotted a new malicious adware campaign (Kemoge threat) that has infected Android mobile devices in more than 20 countries. Security researchers at Fireeye have uncovered a malicious adware campaign which relies on a threat dubbed âKemogeâ based on the name of its command and control (C&C) domain aps.kemoge.net. The Kemoge malware is packaged with various popular […]
Chinese Hackers who allegedly compromised servers at LoopPay, the Samsung subsidiary, appear interested in spying on targets through Samsung Pay technology. The Samsung subsidiary LoopPay has been the victim of a security breach that is worrying the security industry. The investigators speculate that attackers’ motivation is the cyber espionage and excluded a financial crime.  If confirmed the security breach […]