Google finds websites meanwhile Shodan finds devices exposed on the web, including Internet of Things devices, that’s why hackers love it! In 2009 John Matherly introduced the Shodan search engine, and at the time the media commented this with doubts and suspicion. Shodan indexes the information related devices exposed on the internet in the same way […]
Morpho is the name of a financially motivated espionage group that targets large enterprises, including Microsoft, Apple, Twitter, and Facebook. Security experts have discovered and analyzed the activities of a financially motivated APT group, dubbed Morpho and Wild Neutron, that has targeted a large number of high profile companies worldwide. According to the analysis published by […]
Hackers are using a new search engine poisoning method to circumvent Google’s page ranking-algorithms, the technique relies on PDF documents. Researchers from Sophos discovered the new search poisoning method used to circumvent cloaking-detection mechanisms implemented by Google. The experts found hundreds of thousands of unique PDF documents per day implementing the poisoning technique. The term cloaking indicates the […]
Cyber attacks can crash trains. Intense security concerns have emerged, after the upgrade of the British railway network that can be affected by malware. The new railway network upgrade in the United Kingdom has raised a lot of concerns, as far as its overall network security is concerned. It seems that over thirty million pounds […]
Researchers discovered several exploits in the data stolen from the Hacking Team, including ones for zero-day vulnerabilities. The recent hack of the Hacking Team firm has caused the exposure of 400GB of corporate data which includes source code (GitHub repository), emails and other sensitive documents belonging to the surveillance software firm. According to security experts at Trend Micro, the […]
A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes. When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe. Tor network is free and it […]
Following the clamorous Hacking Team hack the company asked all its customers to shut down all the operations and don’t use its solutions in this phase. Hacking Team has been hacked and its social media account hijacked, the news is shocking the IT security industry because privacy advocated have always accused the company to sell […]
A number of AirLive Cameras are affected by command injection vulnerabilities that could allow attackers to decode user credentials and control the devices. A number of IP-enabled AirLive cameras manufactured by OvisLink Corp are affected by command injection vulnerabilities that could be exploited by attackers to decode user credentials and completely control the devices. According […]
Hacking Team, the Italian surveillance firm that develops spyware and hacking software has been hacked by attackers that exfiltrated some 400Gbs of data. The Italian security firm Hacking Team has allegedly been hacked, unknown attackers have exfiltrated some 400Gbs of data. The company has often been at the center of heated debate because of surveillance […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. US Healthcare companies are the most targeted by Stegoloader Popular travel websites warn Customers of Phishing scam Ransomware slinging exploit kit targets Flash remote code execution Experts found Government […]