The Australian government has presented his Cyber Security Strategy and admitted the ability to conduct offensive cyber operations. The Australian Government announced its cyber security strategy that includes AU$230 million spending over four years to improve the resilience to cyber attacks of the national critical infrastructure. The strategy is very complete, it includes defensive aspects […]
The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types. The authors of the TeslaCrypt ransomware have introduced a couple of significant improvements, the new variant Version 4.1 has been in circulation for about a week. According to the experts at Endgame Inc., VXers have invested […]
FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates it over DNS. Security experts at FireEye have spotted a new strain of the NewPosThings PoS malware, dubbed Multigrain, that steals payment card data from point-of-sale (PoS) systems and exfiltrate it via DNS to avoid detection. The technique is […]
Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networksâ Security Engineering and Response Team (ASERT) have spotted a tool used in advanced persistent threat (APT) attacks against organizations in East Asia. The researchers have analyzed a dozen attacks that leveraged on malicious Rich […]
The US intelligence is massively expanding in Social Media surveillance pushing new technologies, including artificial intelligence for data mining In-Q-Tel, the CIAâs venture capital firm, has been pursuing various new technologies, including artificial intelligence for data mining, computer algorithms that can detect insider threats and robots which are able to seize delicate objects. This is […]
IBM Security has warned the WordPress community about a spike in the number of attacks leveraging a specific variant of the PHP C99 Webshell. Security experts at IBM reported a spike in the number of cyber attacks pushing a variant of the popular C99 webshell in February and March, a 45 percent increase compared to the previous period. […]
The hacker PhineasFisher published a detailed explanation of how he has hacked the Italian surveillance firm Hacking Team. In July 2015, the surveillance firm Hacking Team suffered a serious security breach, unknown attackers have exfiltrated some 400Gbs of data (including emails, internal documents, and exploit source code), but since now no news regarding the attack was disclosed. Now the […]
New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year. Last year, the security director of a US lottery was discovered hacking the mechanism of the extraction in order to predict the winning tickets. According to new details revealed by The Des Moines Register, the […]
The Italian law enforcement corp Carabinieri and the Europol have dismantled an international criminal group responsible for large-scale ATM skimming. Last Week, the Italian law enforcement corp Carabinieri, in a joint operation with the Europol, has dismantled an international criminal group responsible for large-scale ATM skimming, forgery of documents and money laundering. The operation was codenamed […]
US prosecutors confirmed on Thursday that an American firm lost nearly $100 million in a BEC (business email compromise) scam. The Reuters Agency reported that an unidentified American company was the victim of a clamorous email fraud, scammers have stolen from the firm nearly $100 million. According to the US authorities, fraudsters used a fake […]