Pierluigi Paganini April 14, 2015
Bank and vendors – Which are the threats to cyber security?

The NYDFS released a new report on the Cyber Security in the Banking Sector that highlights problems faced by almost every bank in the US with third party vendors. Last week, The New York State Department of Financial Services (NYDFS) released a report on the Cyber Security in the Banking industry, the analysis revealed several disconcerting […]

Pierluigi Paganini April 13, 2015
APT30 behind a long-running cyber espionage campaign

Researchers at FireEye uncovered a new threat actor dubbed APT30 that run a decade-long cyber espionage campaign backed by the Chinese Government. Security experts at FireEye have uncovered a new long-running cyber espionage campaign, the researchers speculate that the campaign is active since at least 2005. The threat actor behind the campaign was dubbed APT30 by the researchers, […]

Pierluigi Paganini April 12, 2015
How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. Early detection of a data breach is crucial to limit the data exposure, unfortunately sometimes they are necessary many months before a breach is detected by security experts. To […]

Pierluigi Paganini April 04, 2015
Malware infections on Android devices have been halved in 2014

Android presented its Security State of the Union 2014 and confirmed that the number of infections have been halved in a year due to Google’s improvements. Google confirmed that malware infections have been halved in a year due to  security upgrades for the Android mobile platform. Android security engineer Adrian Ludwig explained in a blog post that […]

Pierluigi Paganini March 28, 2015
Iran increased cyber-security spending 12-fold since 2013

Iran is improving its cyber capabilities faster than experts ‘would have ever imagined’ and increased cyber-security spending 12-fold since2013. The British Business Insider published an interesting post on the Iranian cyber capabilities, according the experts the Government of Teheran is improving expertise in the cyber domain faster than experts ‘would have ever imagined’. Iran is […]

Pierluigi Paganini March 27, 2015
Reading the Secunia Vulnerability Review 2015

Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key figures and facts. Secunia has recently released its annual study of trends in software vulnerabilities, an interesting report that highlights the impact of the presence of flaws in common software and provide useful details on the […]

Pierluigi Paganini March 19, 2015
IBM X-Force reported a billion data records leaked in 2014

Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the future of overall online security. Unfortunately, 2014 was one of the worst years and the reason of that was that a lot if viruses and attempts of violation of online privacy. IBM X-Force Threat Intelligence […]

Pierluigi Paganini March 17, 2015
IoT security is still a pipe dream

A research conducted by experts at Symantec highlights disturbing security failures in the IoT devices present in today connected home. The purpose of IoT is connect all type of devices that we have at home, let’s say I am at my work and I want to arrive at home and have my air conditioner at […]

Pierluigi Paganini March 16, 2015
Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report. The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in line with similar studies confirms the increase in the number of successful cyber attacks against organizations. The report analyzed data provided by 814 organizations, it […]

Pierluigi Paganini March 16, 2015
ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR report related to the period September 2014 – February 2015. The ICS-CERT MONITOR report According to the report, the Industrial Control Systems […]