Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than 1.3 million PC worldwide. Early 2015, part of the source code for the 2.0 version of the RIG exploit kit was leaked online due to a dispute between the main developer and a reseller. According […]
ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need to encrypt their data. Recently ESET published an interesting report […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. HORNET, the High-Speed Tor-Like encrypted anonymous network Anonymousâs team GhostSec thwarts Isis terror plots Drone Firing Semi-Automatic Handgun, whatâs next? Advertising hijacking made by Invisible rogue mobile apps are […]
Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popular Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. The data breach highlighted serious security issues in the […]
Experts at Trend Micro discovered that cyber criminals are exploiting the popular Angler Exploit kit to find and infect PoS systems. The popular Angler Exploit kit is used by criminal crews to find and infect PoS systems, this is the last disconcerting discovery made by the experts at Trend Micro. The security researcher Anthony Joe […]
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]
United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let’s try to understand why and which are the risks for the US citizens. A Chinese APT group  believed to be responsible for a series of high-profile data breaches that affected the U.S. Office of Personnel Management, the Anthem, and more recently the United Airlines. According the media […]
Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of Defenceâs email network has been taken down over suspicious activity. According to Pentagon spokeswoman, the unclassified email network used by […]
Security Firm Cyphort Labs reported that 10 million users may have been infected in ten days by a malvertising and exploit kit campaign. Nick Bilogorskiy, a security researcher at Cyphort  revealed that 10 million users may have been infected in ten days due to a malvertising and exploit kit campaign. According to the expert threat actors […]
Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive. Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing campaign was discovered by the security […]