Reports

Pierluigi Paganini February 24, 2016
Operation Dust Storm, hackers Target Japanese Critical Infrastructure

Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security firm Cylance have uncovered a long-running hacking campaign dubbed ‘Operation Dust Storm’ targeting commercial and critical infrastructure organizations in Japan. Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, […]

Pierluigi Paganini February 21, 2016
Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus – A group of experts at Bitglass used watermarks to track data through the Dark Web and discover how far do phished credentials get. In April 2015, a group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. The experts discovered […]

Pierluigi Paganini February 19, 2016
AV-TEST 2015 AWARDs – Which is the best antivirus solution?

2015 awards – For the fifth year in succession the AV-TEST Institute is awarding firms that offered the most efficient IT protection solutions. On February 17, 2016, the independent institute AV-TEST is awarding the AV-TEST AWARDs to companies who developed antivirus software in 2015. The awards were assigned to products grouped in the categories “PROTECTION”, “PERFORMANCE” […]

Pierluigi Paganini February 19, 2016
Tens of thousands of DVRs exposed on Internet with Hardcoded Passwords

According to a report published by Risk Based Security more than tens of thousands of DVRs are exposed on the Internet with a hardcoded password. According to a report published by Risk Based Security (RBS), the firmware of DVRs manufactured by China-based Zhuhai RaySharp contains hardcoded credentials that could be used by a remote hacker […]

Pierluigi Paganini February 17, 2016
$103,000 stolen in Brain Wallets cracking attacks

A group of researchers discovered that roughly 1,000 brain wallets have been drained by cyber criminals that have stolen $103,000 The term brainwallet refers to the concept of storing Bitcoins in one’s own mind by memorization of a passphrase. The phrase is converted into a 256-bit private key with a hashing or key derivation algorithm (example: SHA256). That […]

Pierluigi Paganini January 31, 2016
27% of all detected malware appeared in 2015

According to a new report from Panda Security more than 84 million new malware samples were detected over the 2015, 27% of all malware of ever. In 2015, security experts have detected the a record number of new malware, according to a report published by Panda Security more than 84 million new malware samples were collected. […]

Pierluigi Paganini January 28, 2016
ENISA Threat Landscape 2015, a must reading

ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I’m very happy to announce the publication of the annual ENISA Threat Landscape 2015 (ETL 2015), this is the fifth report issued by the European Agency. The ENISA Threat Landscape 2015 summarizes top cyber threats, experts have identified […]

Pierluigi Paganini January 27, 2016
Nuclear Threat Initiative says nations not prepared to repel cyber attacks on nuclear facilities

According a report from the Nuclear Threat Initiative, numerous nations are not prepared’ to handle the cyber attacks focusing on their nuclear facilities. Numerous nations are not “prepared” to handle the cyberattacks focusing on their facilities linked to nuclear programs, as per a recent report from the NTI (Nuclear Threat Initiative). The Nuclear Threat Initiative is a […]

Pierluigi Paganini January 24, 2016
Shodan implements a feature to browse vulnerable webcams

Shodan implements a feature to browse vulnerable webcams, including the one that is monitoring your kids while sleeping. The explosion of the paradigm of the Internet of things has dramatically enlarged our surface of attack, it is quite easy to locate vulnerable devices and hack them by using search engines like Shodan and Censys. Both platforms allow finding […]

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]