Security

Pierluigi Paganini February 14, 2017
A simulation shows how a ransomware could hack PLCs in a water treatment plant

The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment plant. The security researchers at the Georgia Institute of Technology have conducted an interesting research on the potential impact of ransomware on industrial control systems (ICS). The researchers David Formby, a Ph.D. student in the Georgia […]

Pierluigi Paganini February 09, 2017
ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security The European Union Agency for Network and Information Security (ENISA) is an EU Agency composed of security experts that work with these states, public organizations and private groups to develop advice and recommendations on good practice […]

Pierluigi Paganini February 03, 2017
Chinese state-sponsored hackers targets Russia and Belarus with ZeroT and PlugX

According to the firm ProofPoint, Chinese state-sponsored actors continues to spy on military and aerospace organizations in Russia and Belarus. Chinese state-sponsored actors are spying on military and aerospace interests in Russia and Belarus. According to the experts from Proofpoint, the attacks began in the summer of 2016, the Chinese hackers launched a spear-phishing campaign leveraging […]

Pierluigi Paganini January 30, 2017
Ransomware shutdown 70% of Washington DC CCTV ahead of President’s inauguration

A Ransomware attack compromised 70% of Washington DC CCTV ahead of inauguration of President Trump, technical staff wiped and rebooted the devices. A ransomware infected 70 percent of storage devices used by the Washington DC CCTV systems just eight days before the inauguration of President Donald Trump. The attack occurred between 12 and 15 January, the […]

Pierluigi Paganini January 28, 2017
WordPress 4.7.2 release addresses XSS, SQL Injection vulnerabilities

According to the release notes the latest version of WordPress 4.7.2 addresses three security, including  XSS, SQL Injection flaws. The WordPress development team has pushed the WordPress 4.7.2 version that fixed three security issues, including a cross-site scripting and a SQL injection vulnerability. The new update comes just two weeks after WordPress released its previous version. Two […]

Pierluigi Paganini January 28, 2017
Business Driven Security: The Case of Building an Advanced Security Operations Centre

In the journey towards business-driven security one of the niche weapon is the roadmap to Advanced Security Operations Centre (ASOC). Now that we have gotten over from new year’s greetings– let’s get to the basics to refresh as what is required in terms of achieving maturity within your organisations. There is no doubt that this […]

Pierluigi Paganini January 26, 2017
Possible Information warfare scenarios behind the Shamoon resurrection

The dreaded Shamoon has resurrected, which are possible political and technological scenarios behind the recent wave of attacks? The dreaded Shamoon has resurrected, a new version called Shamoon 2 was spotted by the security experts at Palo Alto Networks. Saudi Arabia Computer Emergency Response Team (CERT)’s Abdulrahman al-Friah confirmed to Al Arabiya that at least 22 […]

Pierluigi Paganini January 26, 2017
Gmail will stop allowing JavaScript (.js) file attachments starting February 13, 2017

Google announced Gmail will soon stop allowing users to attach JavaScript (.js) files to emails for obvious security reason. Google announced Gmail will soon stop allowing users to attach JavaScript (.js) files to emails for obvious security reason. JavaScripts files, like many other file types (i,e, .exe, .jar, .sys, .scr, .bat, .com, .vbs and .cmd) […]

Pierluigi Paganini January 25, 2017
TorWorld helps you to manage a Tor node, promising an upcoming Tor-as-a-Service

The TorWorld initiative aims to build a community area for those people that desire to set up either a Tor Relay or a Tor Exit node. We all recognize the importance of the Tor network, an important instrument to protect users’ anonymity and avoid censorship. Today I desire to present you an interesting initiative launched by Tor […]

Pierluigi Paganini January 24, 2017
A flaw in the Cisco WebEx Extension allows Remote Code Execution

Tavis Ormandy, a security expert at Google Project Zero, has discovered a critical remote code execution vulnerability in the Cisco WebEx browser extension. Google Project Zero researcher Tavis Ormandy has discovered a critical remote code execution vulnerability in the Cisco WebEx browser extension. Cisco’s initial fix does not appear to be complete, which has led to […]