Reports

Pierluigi Paganini January 27, 2016
Nuclear Threat Initiative says nations not prepared to repel cyber attacks on nuclear facilities

According a report from the Nuclear Threat Initiative, numerous nations are not prepared’ to handle the cyber attacks focusing on their nuclear facilities. Numerous nations are not “prepared” to handle the cyberattacks focusing on their facilities linked to nuclear programs, as per a recent report from the NTI (Nuclear Threat Initiative). The Nuclear Threat Initiative is a […]

Pierluigi Paganini January 24, 2016
Shodan implements a feature to browse vulnerable webcams

Shodan implements a feature to browse vulnerable webcams, including the one that is monitoring your kids while sleeping. The explosion of the paradigm of the Internet of things has dramatically enlarged our surface of attack, it is quite easy to locate vulnerable devices and hack them by using search engines like Shodan and Censys. Both platforms allow finding […]

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]

Pierluigi Paganini January 20, 2016
The rise of the Brazilian Cybercriminal Underground in 2015

Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. A first study […]

Pierluigi Paganini January 20, 2016
Which are the worst passwords of 2015?

SplashData has published its fifth annual report on most used passwords in 2015, including the list of the Worst passwords of the year. For the fifth time, experts from the SplashData security firm have published a report, titled “Worst Passwords of 2015”  that analyzes the use of passwords in 2015. The researchers compiled the annual report with data […]

Pierluigi Paganini January 17, 2016
Energy industry under unceasing attack in 2015

A study conducted by TripWire over the past year revealed successful cyber attacks on the energy industry increased as never before. US oil and gas companies are under attack, over 80% of them have reported a significant increase in the number of cyber attacks. According to Tripwire, over the past year successful cyber attacks have increased […]

Pierluigi Paganini January 04, 2016
BlackEnergy targets Ukrainian news media and electric industry

Security experts at ESET firm provided details of the new campaign based on the BlackEnergy Trojan that targeted Ukrainian news media and electric industry in 2015. A new wave of malware-based attacks is targeting media outlets and energy companies in Ukraines, the attackers rely on malicious code that is able to wipe hard drives of […]

Pierluigi Paganini December 23, 2015
Aethra botnet made up of 12000 Italian devices threatens businesses

Earlier this year experts at VoidSec discovered the Aethra botnet made up of 12000 Italian devices targeting businesses in various industries. Earlier February, experts at VoidSec where performing ordinary maintenance on their personal website when noticed something of strange in the logs. It was a “strange” recurring pattern, revealing a brute force attack against the […]

Pierluigi Paganini December 14, 2015
Inside the German cybercriminal underground

Trend Micro investigated on German crime forums and concluded that Germany possesses the most advanced cybercrime ecosystem in the European Union. We have reported several times the news related to various criminal cybercriminal underground underground communities in the wild, such as American underground, the Russian underground, the Brazil underground, the Chinese underground and also the […]

Pierluigi Paganini December 09, 2015
The North American cyber-criminal underground it’s easy to access!

According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access. The new report released by Trend Micro reveals that the cyber criminal underground market in North America isn’t so hidden like in other countries. “It doesn’t exist in the dark web as much as other […]