Hacking

Pierluigi Paganini March 21, 2015
Major Browsers hacked at Pwn2Own hacking competition

At the  Pwn2Own hacking competition two researchers hacked the four major browsers, Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Safari. Two researchers on Thursday successfully hacked the four major browsers, Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and Apple Safari, at the Pwn2Own, the annual hacking contest in Vancouver. In particular the Korean researcher […]

Pierluigi Paganini March 20, 2015
Researchers developed a new powerful BIOS Bootkit that exploits BIOS flaws

Security researchers developed a new BIOS bootkit that exploit recently discovered vulnerabilities. The experts will present their study to the CanSecWest. BIOS bootkits are a reality despite there is little evidence of BIOS implants in the wild. The BIOS bootkits was mentioned when Snowden disclosed the catalog of surveillance tools used by the NSA ANT division, these malicious malware are […]

Pierluigi Paganini March 20, 2015
Drupal flaw allows reset password by crafting specific URLs

The Drupal team issued an update to fix a flaw that allows attackers reset password by crafting URLs under certain circumstances. Security experts discovered two critical vulnerabilities in Drupal CMS, one of them is an Access bypass (Password reset URLs) vulnerability that could be exploited to forge Password Reset URLs. “Password reset URLs can be forged […]

Pierluigi Paganini March 19, 2015
Mobile apps still vulnerable to FREAK attacks

Despite principal vendors have released updates to fix the FREAK vulnerability many mobile apps for Android and Apple iOS are still vulnerable. Early March, security experts discovered a critical vulnerability codenamed FREAK (CVE-2015-0204), also known as Factoring Attack on RSA-EXPORT Keys, which could be exploited by threat actors to run  man-in-the-middle attacks on encrypted traffic when Internet users visited […]

Pierluigi Paganini March 18, 2015
US health insurer Premera Hacked, 11 Million customers affected

US health insurer Premera Blue Cross announced its network had been hacked, potentially exposing data from 11 million individuals. A few weeks after the disclosure of the data breach suffered by from Anthem Blue Cross, which exposed 80 million customer records, another US health insurer was victim of a major attack that is affecting 11 Million customers […]

Pierluigi Paganini March 18, 2015
DLL Hijacking can affect OS X

DLL hijacking is not a prerogative for Windows systems, it is a common hacking technique that is very effective against OS X based machines. As you may know, DLL hijacking it’s something that its around since around 2000 and allows hackers to exploit a machine with a vulnerable application ( just one of the possibilities […]

Pierluigi Paganini March 16, 2015
Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report. The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in line with similar studies confirms the increase in the number of successful cyber attacks against organizations. The report analyzed data provided by 814 organizations, it […]

Pierluigi Paganini March 16, 2015
ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR report related to the period September 2014 – February 2015. The ICS-CERT MONITOR report According to the report, the Industrial Control Systems […]

Pierluigi Paganini March 15, 2015
Protecting sensitive data: an approach to prevent data exfiltration

Data exfiltration is mechanism to data breach that occurs when an individual’s or organization’s data is illegally copied from its systems. It’s not a matter of “if” you will be attacked, but “when”. Preventing attackers from breaching our system is a necessity and stopping them before they can complete their mission is a requirement. Analyzing […]

Pierluigi Paganini March 12, 2015
Killer USB – how to burn a PC with a USB device

The security expert Dark Purple detailed its experiment for building a weaponized Killer USB device that could be used to burn a machine. Is it possible to use an apparently USB drive to kill an individual? It seems the scene of a Sci-Fi movie, anyway it is an interesting topic to explore. Let’s read together […]