Reports

Pierluigi Paganini November 04, 2015
GovRAT, the malware-signing-as-a-service platform in the underground

Security Experts at InfoArmor discovered GovRAT, a malware-signing-as-a-service platform that is offered to APT groups in the underground. In the past, I have explained why digital certificates are so attractive for crooks and intelligence agencies, one of the most interesting uses is the signature of malware code in order to fool antivirus. Naturally, digital certificates […]

Pierluigi Paganini October 22, 2015
74% organizations think they will be hit by an APT in the near future

The ISACA study “2015 Advanced Persistent Threat Awareness-Third Annual” tries to uncover information security professionals’ understanding of APT threats. A new report published by the ISACA organization that surveyed more than 660 cyber security professionals reveals that more than one in four organizations (28%) have already suffered an APT attack. According to the experts, the BYOD is increasing […]

Pierluigi Paganini October 21, 2015
Businesses Using Millions of insecure SHA-1 Certificates

Experts at Netcraft discovered that nearly a million SSL SHA-1 certificates were signed with the potentially vulnerable SHA-1 hashing algorithm. Businesses Using Millions of Flawed Certificates, the news is shocking and refers the adoption of SHA-1 certificates, despite the algorithm is considered no more secure. Many big businesses, including firms like Deloitte, are still using SHA-1 certificates, […]

Pierluigi Paganini October 18, 2015
The number of Governments using the FinFisher Spyware is increased

A new research conducted by Citizen Lab revealed that the number of governments using the FinFisher surveillance software has increased. Researchers at Citizen Lab have been monitoring the use of surveillance tools like FinFisher over the past years reporting its use by totalitarian governments. The researchers tracked the physical locations of servers belonging to the control infrastructure used […]

Pierluigi Paganini October 16, 2015
88% of Android devices vulnerable due to slow patch management

Researchers probed 20,400 Android devices and found 87.7 per cent contained at least one exploitable vulnerability due to a slow patch management. New Android vulnerabilities are discovered every day, but it looks like that, some Android vendors are very slow in applying the necessary patch to fix the security issues. Some Android vendors are only […]

Pierluigi Paganini October 16, 2015
McAfee study on the prices of stolen data on the Dark Web

McAfee Labs has analyzed a number of websites and services in the Dark Web used by the criminal communities for the commercialization of stolen data. You know my passion for the Dark Web, I spend a lot of time monitoring activities in the hidden part of the web with a particular interest in illegal activities that […]

Pierluigi Paganini October 13, 2015
The rise of the Japanese Cybercrime Underground

Researchers at Trend Micro have issued a new report on the Japanese Cybercrime Underground, a growing criminal community with his characteristics. Cybercrime underground is a growing and prolific industry that knows no crisis as demonstrated by the numerous reports issued by principal security companies and law enforcement. In the past we have analyzed criminal most […]

Pierluigi Paganini October 13, 2015
MEF – Annual Report 2015 – Payment card frauds

The CENTRAL MEANS OF PAYMENT ANTIFRAUD OFFICE (UCAMP) of the Italian Ministry of Economy and Finance released the annual report on Payment card frauds. This year I’m among the experts who worked on the MEF – Annual Report on Payment Card Frauds No. 5/2015, it has been an honor and a pleasure to be able […]

Pierluigi Paganini October 11, 2015
The Dark web – Why the hidden part of the web is even more dangerous?

Cyber Threat Summit 2015 – Study on criminal activities in the dark web.  “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]

Pierluigi Paganini October 08, 2015
Iranian Cleaver hackers exploit LinkedIn for cyber espionage

The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage purpose. Do you remember the Iran-based APT Cleaver? In December the security firm Cylance released a detailed report on the hacking Operation Cleaver that was run by state-sponsored hackers linked to the Iran. The Iranian hackers targeted critical infrastructure worldwide, ten of which […]