Ello, the new social network which is considered the anti-Facebook, was knocked down on Sunday by a distributed denial of service (DDoS) attack. In these days, many articles reported the born of Ello, a new social network considered as a possible antagonist of the giant Facebook. Ello creator considers it as a “tool for empowerment” […]
The FBI Operational Technology Division which is responsible for malware analysis opens its Malware Investigator portal to the private industry. The FBI has opened its Malware Investigator portal to industry in order to information sharing on this type of cyber threat and to improve incident response in case  of attacks against. The FBI hopes to speed […]
The Europol issued 2014 Internet Organised Crime Threat Assessment (iOCTA) report to provide details about on-going developments in the cyber criminal ecosystem. The Europol European Cybercrime Centre (EC3) has issued the 2014 Internet Organised Crime Threat Assessment (iOCTA) which describes the evolution of cybercrime an the models of sales adopted in the criminal ecosystem. This ‘Crime-as-a-Service‘ business […]
Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit organizations and non-governmental organizations by compromising legitimate website. The threat actors use to compromise legitimate websites to host iframes used to hijack visitors […]
A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence and other celebrities. The Fappening is now in its third episode and the celebrities are naked again. The Fappening seems to be never ending story, a new archive of nude celebrity photos has been leaked online. The […]
Experts at Akamai spotted a new malware kit named Spike which is used by bad actors to run DDoS attacks through desktops and Internet of Things devices. According to Akamaiâs Prolexic Security Engineering & Response Team (PLXsert) a new malware kit dubbed Spike was used by bad actors to run DDoS attacks through routers, smart thermostats, […]
The critical vulnerability Bash Bug in common GNU shell could be exploited by botmaster to infect a huge number of machines on a large scale. The recently discovered Bash Bug vulnerability, coded as CVE-2014-6271 and known also as “Shellshock,” is worrying the security community due to its impact on a large-scale. The remotely exploitable critical flaw affects Linux, Unix and […]
A Greek security researcher discovered a strain of malware which is a combination of AutoIT software and a commercial Keylogger named Limitless Keylogger. A few days ago security a database containing 5 million alleged Google login and password has been leaked online on a Russian cyber security internet forum. Google immediately started its investigation and discovered that huge archive […]
In a statement issued by Jimmy Johnâs the company confirmed a data breach to its point-of-sale systems at 216 locations in the US. The US sandwich chain Jimmy Johnâs has confirmed a breach at its 216 stores. The news was reported by the KrebsonOnSecurity a few weeks after that Brian Krebs announced investigation on breach claims. Jimmy Johnâs company […]
Ongoing cyber espionage campaign based on BlackEnergy malware hit targets in Poland, Ukraine and Belgium. Experts at ESET and F-Secure firms analyzed it. BlackEnergy malware is still in the wild representing a serious threat, a new âLite’ version of the malware has been detected by experts at ESET security firm. BlackEnergy is a popular DDoS Trojan, gained […]