Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. A first study […]
SplashData has published its fifth annual report on most used passwords in 2015, including the list of the Worst passwords of the year. For the fifth time, experts from the SplashData security firm have published a report, titled “Worst Passwords of 2015”  that analyzes the use of passwords in 2015. The researchers compiled the annual report with data […]
A study conducted by TripWire over the past year revealed successful cyber attacks on the energy industry increased as never before. US oil and gas companies are under attack, over 80% of them have reported a significant increase in the number of cyber attacks. According to Tripwire, over the past year successful cyber attacks have increased […]
Security experts at ESET firm provided details of the new campaign based on the BlackEnergy Trojan that targeted Ukrainian news media and electric industry in 2015. A new wave of malware-based attacks is targeting media outlets and energy companies in Ukraines, the attackers rely on malicious code that is able to wipe hard drives of […]
Earlier this year experts at VoidSec discovered the Aethra botnet made up of 12000 Italian devices targeting businesses in various industries. Earlier February, experts at VoidSec where performing ordinary maintenance on their personal website when noticed something of strange in the logs. It was a “strange” recurring pattern, revealing a brute force attack against the […]
Trend Micro investigated on German crime forums and concluded that Germany possesses the most advanced cybercrime ecosystem in the European Union. We have reported several times the news related to various criminal cybercriminal underground underground communities in the wild, such as American underground, the Russian underground, the Brazil underground, the Chinese underground and also the […]
According to a new report published by Trend Micro, the North American cyber criminal underground is very easy to access. The new report released by Trend Micro reveals that the cyber criminal underground market in North America isn’t so hidden like in other countries. “It doesn’t exist in the dark web as much as other […]
Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The findings are astonishing! Researchers from SEC consult analyzed more than 4000 firmware’s embedded devices, where is included devices belonging to 70 vendors. The categories of devices analyzed include Internet gateways, routers, modems, IP cameras, VoIP […]
A new security audit the TrueCrypt software confirmed that even if it is plagued by some vulnerabilities, the application is effective when it comes to protecting data. TrueCrypt, secure or insecure … that is the question. A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt […]
Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I’m about to tell you is staggering, the US Department of Homeland Security is running dozens of unpatched and vulnerable databases, a number of them contained information rated as “secret” and even “top secret.” The discovery emerged […]