Symantec observed a significant increase in the number of email-based attacks using malicious Windows Script File (WSF) attachments. Experts from Symantec are observing a significant increase in the number of email-based attacks leveraging malicious Windows Script File (WSF) attachments. Â Over the past three months, threat actors have adopted the tactic in the wild, mostly criminal […]
The US Government is thinking of a possible cyber strike against the Kremlin in response to the alleged interference with the 2016 presidential election. A few days ago the US Government has formally accused the Russian Government of trying to interfere in the 2016 Political Election. Washington is officially accusing Russia trying to interfere the 2016 US […]
Hackers have leaked online over 58 million customer records from data storage firm Modern Business Systems, but the situation could be more severe. 58 million customer records have been leaked online by hackers, the huge trove of data seems to come from a data storage firm. The records include personal information such as names, dates of […]
A Microsoft security duo released a new tool dubbed NetCease designed to make hard for attackers to conduct reconnaissance. Microsoft experts have released a tool dubbed NetCease that was designed to make hard reconnaissance activities of hackers. The NetCease tool was developed by two researchers of the Microsoft Advanced Threat Analytics (ATA) research team, Itai Grady and Tal Beâery. The […]
The website and the forum of the Evony gaming company were hacked this summer and as a result 33 Million of its gamers have their data compromised. Data of more than 33 million accounts of the Evony gaming company were stolen as result of a data breach occurred in June. Evony is the company that […]
Akamai Technologies revealed that hackers are exploiting a 12-year-old bug in OpenSSH to hack into millions of IoT devices with SSHowDowN Proxy attacks. IoT devices are a privileged target for hackers, design flaws and wrong configurations open to the attackers. Recently we read about massive DDoS attacks powered by huge botnets powered by hundreds of […]
Tor Project and Mozilla are working together to improve the security of Tor users and make harder for attackers to unmask them. Intelligence and law enforcement agencies continue to invest in order to de-anonymize Tor users. In the past, we received news about several techniques devised by various agencies to track Tor users, from the correlation attacks to the hack […]
Cisco fixed a critical vulnerability in the Cisco Meeting Server, tracked as CVE-2016-6445,  that allows remote attackers to impersonate legitimate users. A security vulnerability in Cisco Meeting Server, tracked as CVE-2016-6445, could be exploited by attackers to impersonate legitimate users. Experts from Cisco uncovered the vulnerability during a routine security audit of a customer. The hole resides […]
Dell issued the SonicWALL Email Security OS 8.3.2 release to address high severity issues that can be exploited to take control of the appliance. Security researchers at Digital Defense discovered multiple vulnerabilities while assessed the SonicWALL Email Security virtual appliance (Version 8.3.0.6149). According to the experts. The flaws could be exploited by attackers to conduct a wide […]
Attackers are exploiting a recently patched high-severity DoS flaw, tracked as CVE-2016-2776, in the in the popular DNS software in BIND. Last month a vulnerability in the popular DNS software BIND, tracked as CVE-2016-2776, has been patched. The flaw could be exploited by a remote attacker to trigger a DoS condition using specially crafted DNS packets. The […]