Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]
An investigation conducted by The Motherboard demonstrates that is quite easy to buy Surveillance Equipment avoiding export restrictions. Recently I wrote a post titled “Cellphone Surveillance: The Secret Arsenal” that includes interesting information about the principal cellphone surveillance equipment available on the market. This equipment is reserved in the majority of cases for a military or law enforcement usage, but […]
Lights and shadows of the cyber defence market that will reach 170 billion in 2020 becoming vital to the global economy. Cyber defence industry is making money. In 2015, the market will reach 75 billion and in 2020 it will grow to around 170 billion. For some countries like the US, Israel, India and Europe, […]
A study conducted by TripWire over the past year revealed successful cyber attacks on the energy industry increased as never before. US oil and gas companies are under attack, over 80% of them have reported a significant increase in the number of cyber attacks. According to Tripwire, over the past year successful cyber attacks have increased […]
A number of Cisco wireless devices have been designed with hardcoded passwords, including Wi-Fi gear, WLAN controllers, and ISE.Cisco wireless points designed with hardcoded passwords. Bad days for IT giants, recently an unwanted code was discovered in Juniper appliances and a hardcoded backdoor affects some Fortinet Firewalls. Problems of a different nature, but equally uncomfortable, afflicts Cisco wireless LAN controllers, the Cisco […]
Microsoft patched a Silverlight zero-day discovered by analyzing internal emails stolen to Hacking Team about Silverlight exploit. Microsoft recently fixed a number of vulnerabilities with the MS16-006 critical bulletin, including a Silverlight flaw CVE-2016-0034 that could be exploited for remote code execution. The Silverlight flaw discovered by the experts at Kaspersky Lab as a result of an investigation on the Hacking Team arsenal disclosed in […]
A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s Project Zero vulnerability research team, publicly disclosed critical vulnerabilities in TrendMicro Antivirus that could be exploited to execute malicious code on the targeted system. Ormandy took only about 30 seconds to find the […]
Cybersecurity is one the worldâs largest growing concerns, which are the Online Security Threats to Watch for in 2016. Security Affairs has shown me the way to a more secure online life Not only do they post great tips regarding how to take care of your computer, they provide one with information as to what […]
The Russian Sandworm APT group if the first suspect for the Ukrainian power outage, states experts at eiSight Partners. According to a report published by experts at eiSight Partners the cyber attack against a Ukraine power station has been managed by a Russian group called Sandworm. A few days ago experts at ESET reported the existence of a […]
When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to further risks. A new study made by researchers from NowSecure shows that IoT vendors have yet a lot to learn in terms of security, often doing many mistakes in that area. In the […]