Kaspersky Lab discovered another APT group dubbed CozyDuke which is believed to have hacked the US Department of State and the White House. Experts at Kaspersky Lab have uncovered a new advanced persistent threat (APT) dubbed CozyDuke that targeted several high-profile organizations in the second half of 2014. Kaspersky experts have published an interesting blog post that includes […]
At RSA conference 2015 a researcher demonstrated that Avaya’s Ethernet office phones can be compromised with just a simple text editor. At the RSA conference 2015 in San Francisco, Dr Ang Cui from Columbia University PhD and Red Ballon Security cofounder announced that Avaya’s Ethernet office phones can be compromised with just a simple text […]
Four security researchers at the Columbia University have developed a new technique dubbed Spy in the sandbox attack to spy on victims’ online activity. Four security researchers at the Columbia University (Yossef Oren, Vasileios Kemerlis, Simha Sethumadhavan, and Angelos Keromytis) have developed a new technique to hack computer using a Javascript that allow them to […]
The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta 1 running on iPhone 6. Apple has just released the iOS 8.4 beta version for its mobile devices and the popular hacker Stefan Esser, also known as i0n1c, has already released a jailbreak to the community of […]
Cyber security expert Cesar Cerrudo once again is warning the IT security community on the risks related to deployment of flawed Smart city systems. My readers know very well the cyber security expert Cesar Cerrudo that is author of several interesting studies on smart city systems, in August 2014 he presented a research on vulnerabilities affecting […]
Operation Pawn Storm allegedly run by hackers backed by the Russian Government still advancing their infrastructure a great deal, the group is believed to using advanced tactics to hit the targets. Trend Micro revealed that the group have introduced all new infrastructure and is “Zeroing in” onto the targets that include NATO (North Atlantic Treaty […]
Security researcher Marcus Murray discovered a method to exploit a malicious JPEG to compromise modern Windows servers inside corporate networks. Security expert and penetration tester Marcus Murray discovered a way to use a malicious JPEG to compromise modern Windows servers and elevate privileges over targeted networks. The researcher has demonstrated the attack a few days […]
FireEye recently detected a new highly targeted attack run by APT28 exploiting two zero-day flaws to compromise an “international government entity”. Security experts at FireEye have recently detected a new cyber espionage campaign, dubbed “Operation RussianDoll,” operated by the Russian APT28 group. This time the hackers run highly targeted attack by exploiting two zero-day vulnerabilities to target an “international […]
A new deep web marketplace dubbed TheRealDeal has appeared and it is offering a platform for both sellers and buyers of the zero-day exploits. The anonymity ensured by the Dark Web and black markets it hosts is an element of attractive for cyber criminal and intelligence agencies. Black markets offer a wide range of illegal products and services, despite normal people believes that drugs and […]
A Safari iOS/OS X/Windows cookie access vulnerability (CVE-2015-1126) potentially affects a billion iThings devices, patch it as soon as possible. The security researcher Jouko Pynnönen at Finnish firm Klikki Oy, has discovered a since patched bug (CVE-2015-1126) that could potentially affect a billion Apple iDevices. The cross-domain vulnerability affects Safari’s file transfer URL schemes and […]