Hacking

Pierluigi Paganini February 22, 2017
For the second time in a few months Montenegro suffered massive and prolonged cyberattacks

For the second time in a few months Montenegro suffered massive and prolonged cyberattacks against government and media websites. According to the Balkan Insight, attackers have launched a renewed attack on the Montenegrin government and media. The last wave of cyber attacks started on February 15 and lasted several days, according to the government experts it was […]

Pierluigi Paganini February 22, 2017
Microsoft releases security updates for Flash Player, but two disclosed flaws remain unpatched

On Tuesday Microsoft issued the security updates KB 4010250 that address flaws in Adobe Flash Player, but two already disclosed flaws remain unpatched. On Tuesday Microsoft issued the security updates KB 4010250 that address flaws in Adobe Flash Player. The updates fix the vulnerabilities in Internet Explorer on Windows 8.1 and later, as well as […]

Pierluigi Paganini February 22, 2017
FTP Injection flaws in Java and Python allows firewall bypass

The two programming languages, Java and Python, are affected by serious FTP Injection flaws that can be exploited by hackers to bypass any firewall. Attackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls The unpatched flaws reside in the way the two programming languages handle File Transfer […]

Pierluigi Paganini February 21, 2017
Corporate email addresses are 6.2x more targeted by phishing

At the RSA security conference in San Francisco, the experts at Google Research explained that Corporate email addresses are privileged targets for hackers. At the RSA security conference in San Francisco, the experts at the Google Research team at the Google Research team have shared the results of an interesting study on cyber attacks against emails accounts. Corporate […]

Pierluigi Paganini February 21, 2017
Siklu fixed a serious RCE vulnerability in the Siklu EtherHaul Radios

The security researcher Ian Ling discovered a serious remote command execution (RCE) flaw in the Siklu EtherHaul Radios devices. Security expert Ian Ling has discovered a severe remote command execution (RCE) vulnerability in the Siklu’s EtherHaul wireless point-to-point radios. The flaw could be exploited by remote unauthenticated attackers to execute commands and retrieve sensitive information, including […]

Pierluigi Paganini February 21, 2017
Operation BugDrop – Hackers siphoned 600GB taking control of PC microphones

Security firm CyberX uncovered the Operation Bugdrop, a cyber espionage campaign that mostly targeted Ukrainian organizations. Researchers at Security firm CyberX have discovered a cyber espionage campaign that siphoned more than 600 gigabytes from about 70 targets in several industries, including critical infrastructure and news media. The list of targets includes: A company that designs […]

Pierluigi Paganini February 21, 2017
Experts at BAE Systems found false flags in the Lazarus malware

Security experts who analyzed the malware used in the attacks against the Polish banks discovered false flags in the Lazarus malicious code. A few weeks ago, security experts reported that the systems of several Polish banks were targeted by hackers. The systems were infected with a malware after their staff visited the site of the […]

Pierluigi Paganini February 20, 2017
TeamSpy malware is back, it transforms TeamViewer into a spying software

Security experts from Heimdal Security discovered a new spam campaign over the weekend leveraging the TeamSpy malware to spy in victims. Security experts from Heimdal Security have uncovered a new spam campaign emerged over the weekend. The crooks used the notorious TeamSpy malware to gain full access to the target computers. It’s a long time we have no […]

Pierluigi Paganini February 20, 2017
Here you are the distribution network behind the Ursnif banking Trojan

The security experts at Palo Alto Networks published a detailed analysis of the architecture used to spread the Ursnif banking Trojan worldwide. Malware researchers from Palo Alto Networks are monitoring the diffusion of the Ursnif banking Trojan worldwide and have identified the architecture used to spread it. The Ursnif Trojan is spread via spam emails that contain […]

Pierluigi Paganini February 20, 2017
A group of Iraqi hackers called Pro_Mast3r defaced a Trump website

The group of Iraqi hackers called “Pro_Mast3r” has breached the server hosting a Trump website associated with campaign donations. A group of hackers who is calling themselves “Pro_Mast3r” has defaced a website associated with President Donald Trump’s presidential campaign fundraising on Sunday. The website was hosted on the server secure2.donaldjtrump.com that is managed by the Cloudflare content […]