Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The U.S. Computer Emergency Readiness Team(US-CERT) issued the Alert (TA16-144A) to warn of leaked WPAD queries could result in domain name collisions with internal network naming schemes. The WPAD queries are intended for resolution on private or enterprise DNS […]
The researchers at the Tor project are working on a new distributed random number generator that will be included in the next-generation Tor. The researchers at the Tor project have elaborated a new way to generate random numbers to support security improvements of its next-generation onion router. The Random Number Generators are essential components for […]
Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores. Google wants to replace traditional passwords on Android with “trust scores,” and it is planning to do it by 2017. The announcement was officialized at the Google I/O conference, the IT giant intends to use Google’s Trust API technology developed by […]
What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here come all the answers. A definition What is a SOC? A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization’s security posture while […]
The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers disguised as USB phone chargers. The FBI is warning actors in the private sector about a rapid diffusion of stealthy keystroke loggers disguised as USB phone chargers. The FBI issued a Private Industry Notification warning of the […]
Japanese police are investigating coordinated raids across stores in Japan that resulted in the theft of $13m from ATMs in just three hours. Cybercrime doesn’t know boundaries, and in many countries, security experts are observing a rapid evolution of illegal phenomena on the web. The Japan actually hosts one of the most interesting underground communities, a criminal online […]
Cisco issued a series of patches for the AsyncOS operating on CISCO WSA that fix multiple high severity Denial-of-Service (DoS) vulnerabilities. Cisco has released security patches for the AsyncOS operating system that run on the Web Security Appliance, also called CISCO WSA. The security updates fix multiple high severity Denial-of-Service (DoS) vulnerabilities. Below the details […]
A security researcher from ESET security firm issue a Teslacrypt decryption tool after the author closed the project and released a free master key. The victims of the dreaded TeslaCrypt Ransomware now have the opportunity to restore their files by using a decryptor developed by experts from the ESET security Firm. “Today, ESET® released a […]
A crew of cyber spies named Suckfly group is targeting organizations in India, it conducted long-term espionage campaigns against entities in the country. A group of high professional hackers called Suckfly is targeting organizations in India, according to the experts at Symantec the crew conducted long-term espionage campaigns against the country. Symantec did not disclose the […]
The vulnerability CVE-2016-4010 allows an unauthenticated attacker to execute PHP code at the vulnerable Magento server and fully compromise the shop. The Israeli security expert Nethanel Rubin (@na7irub) has reported a critical flaw (CVE-2016-4010) in the eBay Magento e-commerce platform that could be exploited by hackers to completely compromise shops online. The vulnerability rated 9.8/10 has been […]