Security researcher Dancho Danchev profiled a new commercially modular malware platform recently released on the underground marketplace. A new commercially modular malware platform has been released on the underground marketplace, the news is posted by the security expert Dancho Danchev. Danchev recently observed a new modular malware platform specifically designed to provide a series of powerful features […]
TrendLabs has just published the third quarterly report, titled The Invisible Web Unmasked, on the evolution of cybercrime observed in recent months. TrendLabs have published an interesting report titled titled “The Invisible Web Unmasked” to provide a picture of cybercrime evolution observed in recent months. The takedown of the virtual currency Liberty Reserve, the seizure […]
The clients of the Brazilian financial institutions have been hit by a banking trojan embedded in RTF file and spread through a spam campaign. The banking is one of the most targeted sector by cybercrime that exploit always new vector to infect a customer’s machine of the clients of banks. I decided to write this […]
FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual it is crucial to track and mitigate so dangerous threats in time to avoid serious problems. FireEye Labs has detected a new series of attacks based on the exploit of a new IE zero-day vulnerability […]
A new version of the popular black market Silk Road has been launched, the greatest illegal marketplace on Tor network has risen again. The Silk Road is up again, the biggest black market of the Tor network came online on Wednesday. Silk Road was seized by the FBI last October, law enforcement has also identified […]
Intelligence Ian Malloy has discovered an hidden variant of the popular Zeus banking trojan in the GreatestArcadeHits servers. GreatestArcadeHits.* serves up more than entertainment, in fact they don’t serve up entertainment at all. Hidden in the application is the infamous ZEUS/ZBOT, a banking trojan that has the capacity to spoof online banking sites to steal […]
Security experts at Securi firm have recently detected a series of SQL Injection attacks conducted abusing of the Google Bot activity. The exploitation of search engines like Google and Bing to conduct an attack represents an optimal choice for hackers that intend to stay hidden during the offensive. No IT administrator would block traffic from […]
The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described a typical attack scenario. Recently I read an interesting post published on the Websense security labs blog on the use of social network LinkedIn for the reconnaissance phase of an attack. The concept is not […]
The post is an intro to Cyberbullying concept and proposes an interesting infograph to better understand the entity of the forms of cyber harassment. Cyberbullying is the use of the Internet and any other technology to harm or harass other people, in a deliberate, repeated, and hostile manner. Unfortunately this phenomena are in constant increase, in […]
Finland’s foreign minister announced that foreign intelligence agents had carried out large-scale cyber espionage into government communications. The Finnish Ministry of Foreign Affair networks has been targeted in a cyber espionage operation lasting at least four years, the news has been reported by the Finnish commercial broadcaster MTV3. Finland’s foreign minister Erkki Tuomioja confirmed the shocking news, a large […]