A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The silent war between black markets in the deep web US Air Force located an ISIS command by analyzing a selfie A quick tour in the hacking black market […]
German media states that Bundestag may need to replace 20,000 computers after the recent attack, an operation that could cost millions Euro. A few days ago the experts the German Government has confirmed that hackers who breached the Bundestag systems a few of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, […]
Threat actors used a Duqu 2.0 worm in a series of attacks worldwide that also breached the systems at Kaspersky Lab. It is most complex malware ever seen. A new powerful strain of Duqu malware, dubbed Duqu 2.0, appeared in the wild after going dark in 2012. Duqu 2.0 is a very sophisticated agent that exploited a number […]
FireEye speculates that behind the hack of Franceâs TV5Monde television channel there is the popular APT28 that used the pseudonymous ISIS Cyber Caliphate. Security experts involved in the investigation on the hack of Franceâs TV5Monde television channel revealed that behind the pseudonym of ISIS âCyber Caliphateâ there were Russian hackers. “Russian hackers posing as the ISIS âCyber Caliphateâ […]
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]
ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools. ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in […]
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]
The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks The Importance of Operational Security and User Education CIA Chief: Ending NSA Spying Would Boost […]
The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what does it means for Americans? The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, where the NSA is able to spy internet traffic in search […]