A Fake Occupy Central app containing a spyware is used by unknown to track activists in Hong Kong. Evidences suggest the involvement of Chinese entities. A Fake Occupy Central app is targeting the smartphones of the activists belonging to the Occupy Central pro-democracy movement with spyware. The malicious app has circulated online claiming to be an instrument […]
Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit organizations and non-governmental organizations by compromising legitimate website. The threat actors use to compromise legitimate websites to host iframes used to hijack visitors […]
A Greek security researcher discovered a strain of malware which is a combination of AutoIT software and a commercial Keylogger named Limitless Keylogger. A few days ago security a database containing 5 million alleged Google login and password has been leaked online on a Russian cyber security internet forum. Google immediately started its investigation and discovered that huge archive […]
Ongoing cyber espionage campaign based on BlackEnergy malware hit targets in Poland, Ukraine and Belgium. Experts at ESET and F-Secure firms analyzed it. BlackEnergy malware is still in the wild representing a serious threat, a new âLite’ version of the malware has been detected by experts at ESET security firm. BlackEnergy is a popular DDoS Trojan, gained […]
Security experts at Sophos have detected a surge in cyber attacks based on VBA malware, such threats are still very insidious but often underestimated. Experts at SophosLabs observed a surge in VBA malware, according their analysis macro-based malware accounted for 28 percent of all malware attack detected in July, up from just six percent in June, despite […]
Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to spy on users. Windseeker is a malicious Android app which attracted experts at Lacoon Mobile Security, the principal characteristics of the app are its injection and hooking techniques used to spy on mobile users. The techniques are rare […]
Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the company Home Depot released an update on the evolution of the investigation of the data breach suffered by the company. Home Depot data breach is larger than the […]
ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT (ICSA-14-259-01) several Electricâs StruxureWare SCADA Expert ClearSCADA are affected by different vulnerabilities. The independent researcher Aditya Sood has discovered a weak hashing algorithm and CSRF vulnerability in […]
A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered that hackers gained access to the systems run by US defense contractors work for the US Transportation Command (TRANSCOM). The Senate study released […]
WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software âFinFisherâ were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]