ENISA published a study on the on the threat landscape and provides a list of good practices that aim at securing an Internet infrastructure assets. ENISA has published the annual analysis on the threat landscape, the document titled Threat Landscape and Good Practice Guide for Internet Infrastructure analyzes in details the current cyber threats and […]
Researchers at IBM Trusteer discovered a new toolkit dubbed KL-Remote that allows criminals to run Remote Overlay Attacks without specific skills. It is even more simple for cyber criminals to arrange scams and conduct illegal activities thanks the offer in the cyber criminal ecosystem, for example KL-Remote is a newborn toolkit that could be used to compromise online banking accounts by […]
GE MultiLink managed switches are affected by two vulnerabilities which could be exploited to gain unauthorized access and run DoS attacks on the device. Managed Ethernet switches produced by GE include the hard-coded private SSL key in a number of network devices. The Ethernet switches that present the security hole are designed for use in industrial […]
Google Project Zero team disclosed a new unpatched vulnerability affecting Windows 8.1 systems unleashing the wrath of Microsoft for its disclosure policy. Google’s Project Zero hacking team has disclosed the details of a new unpatched Windows 8.1 Privilege Escalation vulnerability in Microsoft Windows 8.1 OS. It is the second flaw in Windows 8.1 OS publicly disclosed by […]
Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications. At this historical moment, governments are facing increasingly dangerous cyber threats, but their activities are hampered by the large diffusion of encryption mechanisms. Following the Snowden‘s revelations, several IT firms like Google and Apple are […]
New York Times have managed to lead to the declassification of a report, highlighting the participation of the FBI to a warrantless surveillance program terminated in 2012. Links to the Prism surveillance program and leaks from Edward J Snowden point at the FBI being actively present in breaches of privacy. FBI has been linked to […]
The US Energy Department issued the guidance “Energy Sector Cybersecurity Framework Implementation Guidance” for organizations operating in the industry. The Energy industry is constantly under attack, the number of hacking campaigns that are targeting the sector is increasing exponentially. Energy companies and utilities have to adopt a proper cyber security posture in order to mitigate the […]
Several ASUS routers include a service that listens on UDP broadcast port 9999 on the LAN interface and contains an unauthenticated command execution flaw. The Security researchers Joshua Drake discovered a serious vulnerability in the firmware running on several ASUS routers that allows an unauthenticated attacker to run arbitrary command on the device. According to the expert, […]
Security experts at Microsoft detected a new variant in the Win32/Emotet family which is targeting German users with a new spam email campaign. Researchers from Microsoft have uncovered a new criminal campaign is targeting German users with a new variant of a sophisticated banking malware, Trojan:Win32/Emotet.C. The attackers are running Spam email campaign in Germany to serve a […]
Insider theft at Morgan Stanley affected nearly the ten percent of the company’s wealth management clients, the company officially confirmed the incident. The financial services company Morgan Stanley has confirmed a partial client data leak, the incident was confirmed by the firm in a statement published on its website. Morgan Stanley reported that an employee posted […]