Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky Lab in September 2013 announced to have discovered Icefog team, an emerging group of cyber-mercenaries available for hire to conduct surgical hit and run operations against strategic targets. The cyber […]
Intego Malware Research Team discovered that OSX Flashback trojan is still active with sinkholing activity. Mac users must be aware. Flashback Trojan is a cyber threat known since 2011, it is a trojan horse that targeted a Java vulnerability on Mac OS X machines, early 2012 it spread to infect up to 600,000 machines as […]
IT administrator at Monju Nuclear Power Plant discovered that a malware-based attack infected a system in the reactor control room. On January 2nd one of the eight computers in the control room at Monju Nuclear Power Plant was compromised. An IT administrator has discovered that the system in the reactor control room had been accessed over […]
TrendLab malware analysts confirmed that recent Windows Zero-Day vulnerability was exploited in cyber attack against Embassies in a Middle Eastern capital. At the end of the last year Microsoft revealed that a zero-day vulnerability was in use in targeted attacks against Windows XP and Server 2003 systems. The discovery of the flaw in Microsoft OSs was made […]
The Indian Government is launching Netra project for internet surveillance. Obvious concerns for online privacy and freedom of expression of Indian population. The Internet surveillance in India is reality thanks a project codenamed NETRA (Network Traffic Analysis), it is able to detect and automatically capture any voice traffic passing through software such as VoIP systems […]
Dutch security firm Fox IT discovered an ongoing malware-based attack that hit thousands of Yahoo users via malicious ads. Users are alerted. Since the December 30th Yahoo website is proposing a malicious ad that was serving a malware, the discovery was made by Dutch security firm Fox IT. Visitors to the Yahoo website see the […]
Two German researchers at the last Chaos Computing Congress in Hamburg revealed how cyber thieves steal money from ATMs win infected USB Sticks. Cyber criminals are exploiting new techniques to attack ATMs (Automated Teller Machines) infecting the devices with specifically crafted malware. Security researchers discovered a new series of attacks against ATMs, the criminals cut […]
CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is out. Don’t miss it.  SPONSORED BY RSA CONFERENCE 2014 Read each FLIPBOOK edition electronically, online and flip through the page: CYBER WARNINGS E-MAGAZINE: DECEMBER 2013 CYBER DEFENSE MAGAZINE: ANNUAL EDITION FOR 2013 Download a color PDF […]
A rapid look to last trends in malware development observed by security experts at TrendMicro, old threat including new improvements. Security experts have observed during last months an increase in the use of AutoIt coding language To Spread Malware and Toolsets. AutoIt is a very flexible scripting language used since 1999 in Windows environments. The […]
Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with Dexter malware. At the end of 2012, Israel based company Seculert  notified about Dexter malware, used for parsing memory dumps of specific POS software related processes, looking for Track 1 / Track 2 credit card data. Dexter […]