Cisco has rolled out several critical software patches for the CISCO Nexus 7000-series switches and the related NX-OS software. According to the Cisco Security Advisory, an attacker could exploit the vulnerabilities to gain remote access to vulnerable systems and execute code or commands. According to Wednesday’s Cisco Security Advisory, both the Nexus 7000 and 7700 […]
Washington demands a strong response to the alleged Russian attempts to manipulate the Presidential Election 2016 with cyber attacks. US is officially accusing Russia trying to interfere the 2016 US presidential election, announcing it will adopt all necessary countermeasures to defeat the threat. The Office of the Director of National Intelligence and the Department of […]
OilRig campaign – An Iran-linked hacker group which previously targeted organizations in Saudi Arabia has now set its sights on other countries. Iranian hackers which previously targeted organizations in Saudi Arabia are now targeting organizations in other countries, including the US, as part of a campaign identified as OilRig campaign. In addition to expanding its reach, the group has been enhancing its malware tools. Researchers at Palo Alto Networks have been monitoring the group for some time and have reported observing attacks launched by a threat actor against financial institutions and technology companies in Saudi Arabia and on the Saudi defense industry. This campaign referred to as “OilRig,” by Palo Alto Networks, entails weaponized Microsoft Excel spreadsheets tracked as “Clayslide” and a backdoor called “Helminth.” Bank attacks by the Iran-linked group were analyzed and documented by FireEye in May. Security Week reports that Palo Alto Networks, “discovered that it has also targeted a company in Qatar and government organizations in the United States, Israel and Turkey.” Helminth is delivered, by the threat actors behind OilRig, by way of spear-phishing emails and malicious macro-enabled Excel documents. For instance, in the caseof a Turkish government organization, the Excel file was designed to replicate a login portal for an airline. There are four variants of the Helminth malware and the threat, capable of communicating with its command and control (C&C) server over both HTTP and DNS, can gain information on the infected device and download additional files via a remote server. One type of Helminth malware relies on VBScript and PowerShell scripts. Another is deployed as an executable file. Delivered by […]
Security experts have discovered more than 500,000 vulnerable Internet of Things (IoT) devices that could be potentially recruited in the Mirai botnet. In the last weeks, security experts observed two of the powerful DDoS attacks of ever that hit the hosting provider OVH and the websites of the popular security expert Brian Krebs. Malware researchers believe that the […]
X.Org released patches and updates to fix several flaws found in many client libraries that could be exploited to cause DoS and escalate privileges. X.Org is a widely used open-source implementation of the X Windows System (aka X11 or X-Windows) that is the graphical windowing system adopted by Unix and Linux operating systems. A set […]
Researchers have been monitoring a campaign dubbed Magecart that compromised many ecommerce websites to steal payment card and other sensitive data. Researchers have been monitoring a campaign in which cybercriminals compromised many e-commerce websites in an effort to steal payment card and other sensitive information provided by their customers. Security experts from cloud-based security solutions provider […]
A joint operation of international law enforcement agencies allowed the arrest of suspected Lizard Squad Hackers in the US and Netherlands. Law enforcement in the US and in the Netherlands have arrested last month two teenagers suspected of being members of the dreaded hacking groups Lizard Squad and PoodleCorp. Both hacking teams are known for powerful […]
Mac malware could spy on users by piggybacking on webcam sessions started by legitimate applications such as FaceTime, Skype and Google Hangouts. Security experts are worried about the presence of a new Mac malware in the wild that attempt to record video via the built-in webcam. The principal problem for this family of spyware is […]
Hackers could use Insulin Pumps as weapons, this is not a sci-fi movie, but a disconcerting reality. The OneTouch Ping insulin pumps manufactured by Animas, a company owned by Johnson & Johnson, are affected by multiple several vulnerabilities that can be exploited by remote hackers to harm the diabetic patients who use them. While the security […]
Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and the events demonstrate it. Despite many of the most popular apps are implementing end-to-end encryption, not all applications are equal. Security experts recommend Signal for secure communications, in the aftermath of the DNC hack the staffers […]