Cyber Crime

Pierluigi Paganini October 13, 2015
MEF – Annual Report 2015 – Payment card frauds

The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who worked on the MEF – Annual Report on Payment Card Frauds No. 5/2015, it has been an honor and a pleasure to be able […]

Pierluigi Paganini October 11, 2015
China arrested hackers responding to a US Government request

For the first time, hackers have been arrested in China by law enforcement at the behest of the US government. Is it true cooperation? It is probably the first time that Chinese authorities have arrested hackers in China following a request of the US Government. Two weeks, before the visit of the Chinese President Xi Jinping in the […]

Pierluigi Paganini October 11, 2015
The Dark web – Why the hidden part of the web is even more dangerous?

Cyber Threat Summit 2015 – Study on criminal activities in the dark web.  “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]

Pierluigi Paganini October 11, 2015
The Dow Jones firm confirmed data breach of 3,500 Users

The Dow Jones firm confirmed to have suffered a data breach, payment card and contact info for less than 3,500 users have been exposed. At the end of the last week, the CEO of Dow Jones & Co disclosed a data breach affecting 3,500 people in a letter to customers. Dow Jones is a media company owned […]

Pierluigi Paganini October 10, 2015
Brute-Force amplification attacks on WordPress rely on XML-RPC

Security experts at Sucuri have uncovered threat actors abusing an XML-RPC method to run Brute-Force amplification attacks on WordPress websites. According to the experts at security firm Sucuri, threat actors are exploiting the XML-RPC protocol implemented by WordPress and other popular content management systems to run brute-force amplification attacks. The XML-RPC protocol allows users to […]

Pierluigi Paganini October 09, 2015
Bad actors target entities worldwide via Cisco WebVPN

Experts at Volexity discovered a hacking campaign targeting the CISCO WebVPN VPN product, attackers aim to steal corporate login credentials. A virtual private network (VPN) allows to extend a private network across a public connection, they are mainly used to protect users’ privacy and improve security for data in transit. Virtual Private Networks are commonly used many companies and organizations […]

Pierluigi Paganini October 09, 2015
Who is behind the hack of Uber’s driver database?

The findings of the investigation conducted by Uber on the recent security breach raise doubts on the alleged involvement of a competitor, the Lyft. The findings of the investigation conducted by Uber on the recent security breach that exposed details of its drivers, seems to confirm the involvement of a competitor, the Lyft. On May 2014, […]

Pierluigi Paganini October 09, 2015
Code Signing certificates becoming popular cybercrime commodity

Learn what Certificates as a Service stand for, discover why Code Signing certificates are a precious commodity and find out how to protect yourself online. A recent phenomenon tracked by IBM Security X-Force researchers is the CaaS (Certificates as a service). Cybercriminals would use the Dark Web for selling high-grade code certificates -which they have […]

Pierluigi Paganini October 09, 2015
Kemoge – Malicious Android Adware Infects Devices worldwide

Researchers at FireEye spotted a new malicious adware campaign (Kemoge threat) that has infected Android mobile devices in more than 20 countries. Security researchers at Fireeye have uncovered a malicious adware campaign which relies on a threat dubbed “Kemoge” based on the name of its command and control (C&C) domain aps.kemoge.net. The Kemoge malware is packaged with various popular […]

Pierluigi Paganini October 08, 2015
Chinese Hackers Breached LoopPay for cyber espionage through Samsung Pay

Chinese Hackers who allegedly compromised servers at LoopPay, the Samsung subsidiary, appear interested in spying on targets through Samsung Pay technology. The Samsung subsidiary LoopPay has been the victim of a security breach that is worrying the security industry. The investigators speculate that attackers’ motivation is the cyber espionage and excluded a financial crime.  If confirmed the security breach […]