A Greek security researcher discovered a strain of malware which is a combination of AutoIT software and a commercial Keylogger named Limitless Keylogger. A few days ago security a database containing 5 million alleged Google login and password has been leaked online on a Russian cyber security internet forum. Google immediately started its investigation and discovered that huge archive […]
Ongoing cyber espionage campaign based on BlackEnergy malware hit targets in Poland, Ukraine and Belgium. Experts at ESET and F-Secure firms analyzed it. BlackEnergy malware is still in the wild representing a serious threat, a new âLite’ version of the malware has been detected by experts at ESET security firm. BlackEnergy is a popular DDoS Trojan, gained […]
Security experts at Sophos have detected a surge in cyber attacks based on VBA malware, such threats are still very insidious but often underestimated. Experts at SophosLabs observed a surge in VBA malware, according their analysis macro-based malware accounted for 28 percent of all malware attack detected in July, up from just six percent in June, despite […]
Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to spy on users. Windseeker is a malicious Android app which attracted experts at Lacoon Mobile Security, the principal characteristics of the app are its injection and hooking techniques used to spy on mobile users. The techniques are rare […]
Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the company Home Depot released an update on the evolution of the investigation of the data breach suffered by the company. Home Depot data breach is larger than the […]
ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT (ICSA-14-259-01) several Electricâs StruxureWare SCADA Expert ClearSCADA are affected by different vulnerabilities. The independent researcher Aditya Sood has discovered a weak hashing algorithm and CSRF vulnerability in […]
A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered that hackers gained access to the systems run by US defense contractors work for the US Transportation Command (TRANSCOM). The Senate study released […]
WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software âFinFisherâ were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]
Experts at IBM Trusteer security firms have discovered a massively distributed Citadel trojan targets Middle Eastern Petrochemical companies. Researchers at IBM Trusteer have recently discovered targeted cyber attacks using a variant of the popular Citadel trojan on several Middle Eastern petrochemical companies. The Citadel Trojan is a malware designed to steal personal information, including banking and […]
Trustwave has detected a new series of attacks on servers worldwide based on the exploitation of old CGI-PHP vulnerability to spread BoSSaBoTv2 botnet. It was 2012 when security experts discovered a security flaw (CVE-2012-1823) in some PHP builds that could be exploited by a threat actor to remotely execute commands on the affected server, if PHP was […]