According to a study conducted by the experts at Arbor’s ASERT Team a day attack with a DDoS booter cost $60 and can cause $720k in damage. We have discussed several times about the concept of cybercrime-as-a-service, today I’ll show you a case related the offer for rent of distributed-denial-of-service (DDoS) attacks for less than US$60 per day. […]
Which are the usernames and passwords used by hackers when they scan the internet indiscriminately? Give a look to the Rapid7′ report Recently the firm Splashdata revealed in its annual report on the worst 2015 passwords (“123456” and “password”), today I desire to present you a new interesting study on passwords conducted by Rapid7. The experts used Heisenberg, […]
A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]
Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of experts from the Independent Security Evaluators research team have tested the security of hospital networks, demonstrating how it is possible to gain access to critical medical equipment in attacks they say could put lives in danger. […]
2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per the security firm Gemalto, Government and healthcare have overwhelmed the retail area as most-focused for information breaks. An aggregate of 1,673 information ruptures prompted 707 million information records being traded off worldwide amid 2015, as […]
The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that is believed to be behind the Sony Pictures hack. State-sponsored hackers allegedly behind the Sony Pictures hack have been linked to other security breach suffered by a number of companies in South Korea. The FBI blamed the North Korea, the […]
Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security firm Cylance have uncovered a long-running hacking campaign dubbed ‘Operation Dust Storm’ targeting commercial and critical infrastructure organizations in Japan. Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, […]
Project Cumulus – A group of experts at Bitglass used watermarks to track data through the Dark Web and discover how far do phished credentials get. In April 2015, a group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. The experts discovered […]
2015 awards – For the fifth year in succession the AV-TEST Institute is awarding firms that offered the most efficient IT protection solutions. On February 17, 2016, the independent institute AV-TEST is awarding the AV-TEST AWARDs to companies who developed antivirus software in 2015. The awards were assigned to products grouped in the categories “PROTECTION”, “PERFORMANCE” […]
According to a report published by Risk Based Security more than tens of thousands of DVRs are exposed on the Internet with a hardcoded password. According to a report published by Risk Based Security (RBS), the firmware of DVRs manufactured by China-based Zhuhai RaySharp contains hardcoded credentials that could be used by a remote hacker […]