Motherboard published an interesting report on an espionage campaign led by the Syrian Electronic Army (SEA) against the opponents of the Syrian Government. Today I decided to present a very interesting story published by Lorenzo Francesco Bicchierai on Motherboard. It is a story about intelligence activities and how hacking supported them. Let’s start from the […]
The international criminal police organisation Interpol and private researchers discovered a severe flaw in block chain used by virtual currencies. INTERPOL cyber threat researchers, including members of the Kaspersky Lab, have identified a serious vulnerability in the virtual currencies schema. The flaw resides in the âblock chain’ related to virtual transactions and it could be exploited to […]
A severe vulnerability  in Tor network was exploited by attackers to run denial of service attacks against two underground black markets. An operator of an underground black market hosted on the Tor network revealed that hit site suffered a DoS attack that exploited a flaw in Tor architecture. The event is not isolated, a similar […]
A security researcher discovered that the improper configuration of some multicast DNS (mDNS) implementations could be used to amplify DDoS attacks. The multicast Domain Name System, also known as mDNS,  is a multiplatform service designed to resolve host names to IP addresses within small networks that doesn’t have a local name server. The mDNS can work in a […]
Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability. Once again, home routers are exposed to the risk of cyber attacks. This time the news is related to the Australian consumer broadband modems that resulted affected by the Poodle and Freak vulnerabilities. Many Australian households […]
A Russian researcher has discovered a critical vulnerability in YouTube that could have been exploited by a hacker to delete any video from the website. The Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube that could be exploited by attackers to delete any video the popular video sharing service. The bug hunter is […]
A security researcher discovered a couple of security issues on GitHub platform explaining how it is possible to exploit them in real attack scenarios. The researcher David Sopas (@dsopas) from Websegura discovered a couple of security issues in the coding website GitHub that were ranked by the company as minor, but that could expose users to cyber attacks. […]
Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in Israel Security experts from Check Point Software Technologies have uncovered a new cyber espionage campaign, dubbed Volatile Cedar, that targeted hundreds of entities from at least ten countries (Lebanon, Israel, Turkey, the UK, Japan, the US, etc.). The […]
Anonymous has posted a video message threatening Israel with âthe electronic holocaustâ which would âerase it from cyberspaceâ on next April 7. Once again the group of  hacktivits Anonymous has threatened Israel with âthe electronic holocaustâ which would âerase it from cyberspace.â The massive cyber attack announced by Anonymous is planned on April 7 for âcrimes in the Palestinian territories.â […]
Modern maritime ships are considered a privileged target for hackers and pirates that are increasing their pressure on the Maritime Shipping Industry. Hackers target Cyber Attack on Ships: Maritime Shipping Industry at Risk Modern maritime ships are often monitored and controlled remotely from shore-based facilities thousands of miles away to ensure efficiency. This creates a […]