A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]
The Penn State suffered a high sophisticated cyber attack that that seems to be originated from China and that exposed data belonging to 18K people. The Pennsylvania State University’s College of Engineering confirmed that it has been targeted by two “highly sophisticated” cyber attacks over the last two years. “Today (May 15), University leadership announced […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to âclimbâ. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
Security researchers at Security Explorations firm have published PoCs code for some of security issues in the Google App Engine. The Polish firm Security Explorations has published online the technical details and a proof-of-concept code for security flaws affecting the Google App Engine (GAE) for Java. “Security Explorations decided to release technical details as well as […]
Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand of kids are at risk. Last week, e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web. mSpy, is a software-as-a-service product that officially was designed to […]
Oil and gas industry targeted by hackers with a genuine looking windows file, not a malware. The attacks are ongoing for about two years. A unique targeted attack being underway for about two consecutive years exploits Windows file functions that look legitimate and a couple of homemade scripts – but not malware â in order […]
The security expert Samy Kamkar after the disclosure of a method to easily crack many Master padlock combinations designed Combo Breaker to mechanize it. A couple of weeks ago, the popular security expert Samy Kamkar revealed a method to easily crack many Master padlock combinations in eight tries or less. Unfortunately, it is not so complicated to […]
SAP products make use of a proprietary implementation of LZC and LZH compression algorithms that could be exploited by attackers in several ways. For the second time in a week, we are speaking about security vulnerabilities affecting SAP systems, recently I wrote about a study published by the Onapsis firm that revealed over 95% of SAP […]
The Chinese threat actor known as APT17 and DeputyDog has been using profile pages and forum threads on Microsoftâs TechNet web portal to host IP addresses for command and control (C&C) servers. Security experts at FireEye and the colleagues at Microsoft Threat Intelligence Center have published a report on the activities of the Chinese group […]
According to a report published by the experts at root9B the hacking crew APT28 is planning to attack several financial institutions worldwide. In October 2014, security expert at FireEye published a report on the activities conducted by a group of Russian hackers, dubbed APT28, the hacking crew is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and […]