ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years which impacted the entire population. Several times we have discussed about the economic impact of a data breach, but in the majority of cases, they were just a raw estimation to give the experts an idea […]
Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx and its arsenal. The Hidden Lynx APT is a China-based group of hackers that conducted numerous cyber espionage campaign against U.S. defense contractors and other foreign organizations. The name Hidden Lynx was assigned to the APT by experts at […]
Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers at Akamai firm have observed an increase of new reflection and amplification DDoS attacks exploiting Internet of Things devices (e.g. SOHO devices, routers, media servers, web cams, smart TVs and printers), which that misuses communications protocols. The […]
Hundreds of Dropbox Passwords allegedly Leaked were publisehd online, but the company reassures its users confirming that its systems were not violated. It’s up to DropBox, an archive of nearly 7 million Dropbox login credentials has been published on PasteBin. A guest account post on Pastebin four different documents, all claiming to be part of […]
Kmart revealed that an undisclosed number of credit card data belonging to its customers were stolen in a data breach which began in early September. Sears Holdings Corp (SHLD.O) confirmed that it was the victim of a major cyber attack which caused the theft of customer payment card data at its Kmart stores. The incident is the last one […]
The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks is also increasing. Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data archived in […]
FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to adopt new security model. Phishing is a common practice in the hacking community, despite the level of awareness of the threat is high, the efficiency of the attacks is still significant. As highlighted in the […]
Experts at Radware DDoS protection solution provider recently have discovered a new form of DDoS attack they dubbed âTsunami SYN Flood Attack.â Radware DDoS protection solution provider recently discovered a new category of distributed denial-of-service (DDoS) attack, according the experts of the company it is a type of SYN flood dubbed âTsunami SYN Flood Attack.â In just 48-hour period […]
The Snappening, hundreds of thousands of unaware users have had their personal Snapchat photos and videos public disclosed by hackers. The Fappening is considered my mass media one of most interesting case of privacy violation, four archives containing a numerous celebrities nude photos have been released in the last weeks … and many experts sustain that the […]
A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a series of attacks on ATM machines which were infected by the Tyupkin malware, the malicious code is used by criminal organizations to compomise the banking machines […]