Security researchers at the iSwatlab have conducted an analysis of a few methods for the creation of some malicious payloads or shellcodes. This work compares some infamous methods for the creation of malicious payloads or shellcodes. These payloads must be used to create a remote connection between the victimâs machine and the attackerâs machine that […]
More than two years after the disclosure of the HeartBleed bug, 200,000 services are still affected. Systems susceptible to Heartbleed attacks are still too many, despite the flaw was discovered in 2014 nearly 200,000 systems are still affected. Shodan made a similar search in November 2015 when he found 238,000 results, the number dropped to 237,539 […]
The Mozilla foundation has published its first Internet Health Report to analyze the dangers of the Internet that we can consider as a global commodity. The Mozilla foundation has published its first Internet Health Report to analyze the dangers of the Internet that we can consider as a global commodity. The oligarchy of internet companies. […]
For the first time the England the Office for National Statistics (ONS) includes data related hacking and fraud, and findings are shocking. Cyber criminal activities in England and Wales have shown a spike in the last twelve months, Cyber frauds and computer misuse offences are most common crimes of this worrisome trend. According to the report “Crime in […]
A raw intelligence document published last week claims Russian cyber experts have cracked Telegram messaging service to spy on opponents. A raw intelligence document published last week contains much information about President Donald Trump and the approach of the Kremlin to the cyber espionage. According to the report, the Russian Federal Security Service (FSB) offers bribes for back […]
Putin ordered cyber attacks and propaganda to influence Election. Reading the âAssessing Russian Activities and Intentions in Recent US Electionsâ Report. The US Office of the Director of National Intelligence (ODNI) has released an unclassified version of intel community’s findings on activities conducted by the Russian Government in the attempt to influence the 2016 US Presidential […]
A FBI-DHS JAR report released implicated Russian hacking group APT28 and APT29 in attacks against 2016 Presidential Election. The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published on Thursday a Joint Analysis Report(JAR) that provides information about the tools, infrastructure and TTPs used by the Russian civilian and military intelligence […]
Security firm RIPS Technologies has analyzed 44,705 in the official WordPress plugins directory and discovered that more than 8,800 of them are flawed. Experts from the security company RIPS Technologies have conducted an interesting analysis of WordPress plugins. The researchers have analyzed 44,705 of the roughly 48,000 plugins available in the official WordPress plugins. “To do […]
The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers cyber security a top priority alongside the resurgence of state-based threats (Russiaâs actions in Syria and Ukraine) and the terrorism (extremism and instability). When dealing with the impact of technology, especially cyber threats the report […]
Experts from the firm Recorded Future published a report on the most common vulnerabilities used by threat actors in the exploit kits. Recorded Future published an interesting report on the most common vulnerabilities used by threat actors in the exploit kits. The experts observed that Adobe Flash Player and Microsoft products (Internet Explorer, Silverlight, Windows) continue […]