Hacking

Pierluigi Paganini March 31, 2017
Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photo

Users can unlock Samsung Galaxy S8 phone by holding their Samsung Galaxy S8 in front of their eyes or their face … or their image. It looks like a film already seen, an IT giant presents a new product and hackers defeat its security measures. This time we are speaking of the Samsung Galaxy S8 and […]

Pierluigi Paganini March 31, 2017
Pro-ISIS Amaq News Site Hacked and exploited to distribute Malware

The Islamic State-affiliated Amaq news agency has been hacked and used to spread a malicious a FlashPlayer file. Who is behind the attack? The Islamic State-affiliated Amaq news agency has been hacked and used to spread a malware. The website is considered as the official news site of the Islamic State, it was used for propaganda and […]

Pierluigi Paganini March 29, 2017
Over 8.3 million live websites using IIS 6.0 are affected by a Zero-Day

Millions of websites are affected by a buffer overflow zero-day vulnerability, tracked as CVE-2017-7269, that resides in the IIS 6.0. The II6 6.0 zero-day flaw was discovered by two researchers with the Information Security Lab & School of Computer Science & Engineering, South China University of Technology Guangzhou, China who published a PoC code exploit on GitHub.  […]

Pierluigi Paganini March 29, 2017
Google hacker found a third flaw in the LastPass password manager in a few weeks

The Google hacker Tavis Ormandy discovered a third flaw in LastPass password manager in a few weeks, the expert provided a few details about the issue. A couple of weeks ago, the notorious Google Project Zero hacker Tavis Ormandy discovered numerous vulnerabilities in the Chrome and Firefox extensions of the LastPass password manager. Wrote a quick exploit […]

Pierluigi Paganini March 29, 2017
Industrial Sector ICSs under attack – Kaspersky Lab’s ICS-CERT

The report shows a disconcerting reality, the number of targeted attacks on the ICSs deployed in the Industrial sector continues to increase. The Kaspersky Lab’s ICS-CERT has published a report on the threat landscape for industrial automation systems (ICSs) related to second half of 2016. The report shows a disconcerting reality, the number of targeted attacks on […]

Pierluigi Paganini March 28, 2017
FBI Cyber Division warns the healthcare industry of FTP attacks

The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) warns the companies in the healthcare industry of FTP attacks. The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) warns the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers of medical and dental facilities that allow anonymous […]

Pierluigi Paganini March 28, 2017
APT29 group used domain fronting to evade detection long before these techniques were widely known

Experts at FireEye discovered the APT29 group adopted domain fronting long before these techniques were widely known in the IT security community. Security firm FireEye continues to follow APT29 group (aka The Dukes, Cozy Bear and Cozy Duke), on Monday it revealed that the cyber spies have been using a technique called “domain fronting” to make hard […]

Pierluigi Paganini March 27, 2017
Miele Professional PG 8528 washer-disinfector affected by a Web Server Directory Traversal

An Internet-Connected Medical Washer-Disinfector, the Miele’s model Professional PG 8528, is affected by a Web Server Directory Traversal. While the number of IoT devices continue to exponentially increase, the level of security of these smart objects is often not adequate end exposes users at risk of cyber attacks. The news of the say is a […]

Pierluigi Paganini March 26, 2017
How much costs a DDoS attack service? Which factors influence the final price?

How much costs a DDoS attack service? Kaspersky Lab published an analysis on the cost of a DDoS attack and services available in the black markets. The DDoS attacks continue to be a profitable business in the cyber criminal underground. Powering a DDoS attack against an organization is even cheaper, running an attack can cost […]

Pierluigi Paganini March 26, 2017
The Winnti Gang continues its activity and leverages GitHub for C&C Communications

Trend Micro discovered the Chinese threat actor Winnti has been abusing GitHub service for command and control (C&C) communications. Security experts at Trend Micro continue to monitor the activities of the Chinese Winnti hacker group, this time the hackers have been abusing GitHub for command and control (C&C) communications. “Recently, the Winnti group, a threat actor with […]