Security

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]

Pierluigi Paganini January 19, 2016
Tactical Surveillance Equipment, too easy to buy online

An investigation conducted by The Motherboard demonstrates that is quite easy to buy Surveillance Equipment avoiding export restrictions. Recently I wrote a post titled “Cellphone Surveillance: The Secret Arsenal” that includes interesting information about the principal cellphone surveillance equipment available on the market. This equipment is reserved in the majority of cases for a military or law enforcement usage, but […]

Pierluigi Paganini January 17, 2016
Cyber defence is a profitable “Hamster Wheel”

Lights and shadows of the cyber defence market that will reach 170 billion in 2020 becoming vital to the global economy. Cyber defence industry is making money. In 2015, the market will reach 75 billion and in 2020 it will grow to around 170 billion. For some countries like the US, Israel, India and Europe, […]

Pierluigi Paganini January 17, 2016
Energy industry under unceasing attack in 2015

A study conducted by TripWire over the past year revealed successful cyber attacks on the energy industry increased as never before. US oil and gas companies are under attack, over 80% of them have reported a significant increase in the number of cyber attacks. According to Tripwire, over the past year successful cyber attacks have increased […]

Pierluigi Paganini January 14, 2016
Cisco wireless points include hardcoded passwords

A number of Cisco wireless devices have been designed with hardcoded passwords, including Wi-Fi gear, WLAN controllers, and ISE.Cisco wireless points designed with hardcoded passwords. Bad days for IT giants, recently an unwanted code was discovered in Juniper appliances and a hardcoded backdoor affects some Fortinet Firewalls. Problems of a different nature, but equally uncomfortable, afflicts Cisco wireless LAN controllers, the Cisco […]

Pierluigi Paganini January 14, 2016
Silverlight exploit discovered by analyzing Hacking Team leaked emails

Microsoft patched a Silverlight zero-day discovered by analyzing internal emails stolen to Hacking Team about Silverlight exploit. Microsoft recently fixed a number of vulnerabilities with the MS16-006 critical bulletin, including a Silverlight flaw CVE-2016-0034 that could be exploited for remote code execution. The Silverlight flaw discovered by the experts at Kaspersky Lab as a result of an investigation on the Hacking Team arsenal disclosed in […]

Pierluigi Paganini January 12, 2016
Google hacker criticized TrendMicro for critical flaws

A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s Project Zero vulnerability research team, publicly disclosed critical vulnerabilities in TrendMicro Antivirus that could be exploited to execute malicious code on the targeted system. Ormandy took only about 30 seconds to find the […]

Pierluigi Paganini January 11, 2016
Online Security Threats to Watch for in 2016

Cybersecurity is one the world’s largest growing concerns, which are the Online Security Threats to Watch for in 2016. Security Affairs has shown me the way to a more secure online life Not only do they post great tips regarding how to take care of your computer, they provide one with information as to what […]

Pierluigi Paganini January 08, 2016
iSight Partners says the Sandworm APT is involved Ukrainian power outage

The Russian Sandworm APT group if the first suspect for the Ukrainian power outage, states experts at eiSight Partners. According to a report published by experts at eiSight Partners the cyber attack against a Ukraine power station has been managed by a Russian group called Sandworm. A few days ago experts at ESET reported the existence of a […]

Pierluigi Paganini January 08, 2016
Experts revealed that security camera vendors lack of security by design

When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to further risks. A new study made by researchers from NowSecure shows that IoT vendors have yet a lot to learn in terms of security, often doing many mistakes in that area. In the […]