A new malicious phishing campaign is spreading CryptoWall ransomware in the wild, the expert Michael Fratello has analyzed it for us. Just a reminder to all — CryptoWall 3.0 is still very much active, with phish tactics that I think are less effective, but who knows; maybe they’re seeing great success with this method. Â Personally, […]
US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to millions of government workers. Once again a data breach interested systems of the US government, the Obama administration on Thursday confirmed to have been the victim of a major cyber attack. According to the US […]
Security experts involved in investigation on the attack against the Bundestag suspect that the hack was part of a large-scale espionage campaign backed by the Kremlin. Last month, the German Bundestag suffered a serious cyber attack by unknown hackers, in the days following the incident the German parliament officially confirmed media reports about a hacking […]
A new Facebook scam in the wild that aim to steal sensitive data proposing a âFacebook Recoveryâ Accounts that share malicious links. It’s not new that Facebook itâs the perfect place to try to get precious information and financial gain since it aggregates many people, crossing all generations. The popular social network is very attractive […]
Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting entities in the Middle East. Security experts at ClearSky have uncovered a cyber espionage campaign dubbed Thamar Reservoir due to the name of its target Thamar E. Gindin. The investigation led the experts to date the Thamar Reservoir […]
The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]
The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope of the global phishing problem. The Anti-Phishing Working Group (APWG) has published the “Global Phishing Survey 2H2014“, a report that comes with some interesting numbers on phishing activities. The Global Phishing Survey 2H2014 report states […]
Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]
Security experts discovered a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication proxy. A recent post published on http://blog.0x3a.com/ it was described a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication proxy. Using FakeAV tactics was in vogue some years […]
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. With new policies […]