Reports

Pierluigi Paganini August 09, 2015
Security Affairs newsletter Round 21 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hacking Industrial Ethernet Switches to take over nuclear plants Microsoft Windows 10 spies on you by default Operation Potao – hackers used a trojanized version of TrueCrypt Mt Goxs […]

Pierluigi Paganini August 07, 2015
Hackers are targeting Gas Tanks worldwide

Security experts from Trend Micro have set up a number of honeypot to study the cyber attacks on vulnerable gas tanks and worldwide. Security researchers at Trend Micro, Kyle Wilhoit and Stephen Hilt have discovered a number of cyber attacks attempting to hack and shut down gas tanks. The researchers have set up honeypots to study […]

Pierluigi Paganini August 06, 2015
The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from victims. An alleged Chinese APT group dubbed Panda Emissary (also known as TG-3390) is targeting high-profile governments and organisations searching for defense aerospace projects. Researchers at Dell discovered that the Panda Emissary group used Watering hole […]

Pierluigi Paganini August 06, 2015
Man-in-the-Cloud Attacks rely on common file synchronization services to hack cloud account

Popular cloud storage services such as Google Drive and Dropbox can be abused by hackers running Man-in-the-Cloud (MITC) attacks. The recently issued Imperva’s Hacker Intelligence Initiative report on Man-in-the-Cloud (MITC) attacks details how threat actors abuse popular cloud storage services for illegal activities. The experts have analyzed a number of cloud storage services including Dropbox, Google Drive, Box, and Microsoft OneDrive. […]

Pierluigi Paganini August 04, 2015
Interpol is training Police officers to fight crime on the Darknet

Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces. Cybercrime becomes even more sophisticated and explores new technologies for its illegal activities. A growing problem for law enforcement agencies world worldwide is to track illegal activities in the Dark Web. Not only cyber criminals, but also groups […]

Pierluigi Paganini July 31, 2015
APT 29 use Twitter to control its Hammertoss data stealer

Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]

Pierluigi Paganini July 27, 2015
Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort of Advertising hijacking. Mobile Malware is growing and crooks are targeting the advertising industry with malicious codes able to redirect users to ad pages, this practice is known as Advertising hijacking. These “rogue mobile apps” […]

Pierluigi Paganini July 27, 2015
FireEye report on TTPs of Nigerian a 419 scammers group

FireEye published a report on the operations of a group of 419 scammers located in Nigeria, which is using malware as a component of their fraud scams. Security firm FireEye has published a new report on a new group of 419 scammers that is using keyloggers and other malware to implement its fraud scheme. According to the investigators, the fraudsters diverted potentially millions […]

Pierluigi Paganini July 26, 2015
Security Affairs newsletter Round 19 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Russian APT launched a new phishing campaign on the Pentagon Dead NIS agent left note denying spying on SK population Microsoft to spoofed Skype users: Change your account passwords […]

Pierluigi Paganini July 25, 2015
All Smartwatches on the market are vulnerable to attacks

A study conducted by HP’s Fortify on security features implemented by Smartwatches revealed that not even a single device found to be 100 percent safe. Today we talk about a great passion of mine, watches. Let me tell you that I’m not attracted by Smartwatches, I consider watches and their gears a work of art […]