Bitdefender has discovered for the third time a flaw in Linux Encryption Ransomware Linux Encoder that exposes the decryption Key used to lock the files. In November 2015, the Russian antivirus firm Doctor Web reported the discovery of a new Linux ransomware dubbed Linux Encoder that was specifically designed to infect Linux systems. The Linux.Encoder1 ransomware encrypts files present […]
IOActive has uncovered a number of serious vulnerabilities affecting the Drupal CMS that could be exploited to completely takeover the vulnerable websites. A new vulnerability affecting Drupal could be exploited for code execution and database credentials theft (by Man-in-the-Middle), according to Fernando Arnaboldi, a senior security consultant working in IOActive. Fernando Arnaboldi says that the […]
The hacking crew Phantom Squad claims responsibility for an alleged DDoS attack that brought down the PlayStation Network. Around 13:00 EST on Monday, The PlayStation Network suffered a major outage worldwide, Sony early confirmed that the network was “experiencing issues” and its status page showed that the problems were affecting all of its major services. Sony […]
Security experts from SCADA StrangeLove group disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems. Recently I wrote about the SCADA StrangeLove research team reporting their study on the level of cyber security implemented in modern railroad systems . Now the SCADA StrangeLove group has published a list of default credentials, dubbed “SCADAPASS,” associated with industrial […]
The zero-day exploit broker Zerodium is offering up to $100,000 to security experts who can provide an exploit for bypassing the Flash heap isolation. Once again, the zero-day exploit trader Zerodium is in the headlines, this time the company is offering $100,000 for the Flash Exploit Mitigation bypass. Adobe announced in December the introduction of several Recently Adobe […]
Hackers cause power outage with the BlackEnergy malware in Ukraine. Is it an Information warfare act? Cyber security of ICS e SCADA systems in the critical infrastructure is essential, these components are a privileged target of cyber criminals and state sponsor hackers. The most popular SCADA attack in the history is the one conducted against control systems […]
After many years, Microsoft admitted that Chinese authorities hacked thousands of Hotmail accounts, belonging to China’s Tibetan and Uighur minorities. After many years, Microsoft finally concluded that Chinese authorities indeed hacked thousands of Hotmail accounts, belonging to China’s Tibetan and Uyghur minorities, but at the time did not warn the users, allowing the victims to […]
According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of vulnerabilities in 2015. Which is the software with the greatest number of publicly disclosed vulnerabilities in 2015? You will be surprised to know that the software with the major number of vulnerabilities is the Apple […]
Alleged Turkish hackers have taken over the Russian Communications and Mass Media Minister Nikolai Nikiforov’s Instagram account. Events in the cyberspace are strictly correlated with facts in the real life, in many cases, disputes between countries are associated with numerous cyber events that could be analyzed by intelligence analysts. The recent crisis in Crimea between Russia and Ukraine is just […]
@FFD8FFDB is a Twitter bot that spies on poorly configured cameras tweeting the images captured by the connected devices. There is an air of mystery when you first notice @FFD8FFDB. However, the next thing you will see is that really gets on to you. There is a strange Twitter account, @FFD8FFDB, that every few minute tweets pictures taken […]