Adobe has released yesterday an out-of-band update to fix a critical remote code-execution vulnerability CVE-2014-8439 in Flash Player that is being exploited in the wild. Adobe has released an emergency patch to patch a critical remote code-execution vulnerability (CVE-2104-8439) affecting Flash Player that was already fixed last month (Adobe’s Oct. 14th), but that was exploited […]
FireEye discovered that the Group of hackers dubbed APT3 that managed the Op Clandestine Fox is now running a new campaign dubbed Operation Double Tap. Researchers at FireEye have uncovered a new advanced persistent threat crew dubbed APT3, which is using exploits targeting recently disclosed vulnerabilities in Windows. The experts at FireEye believe that APT3 is the same […]
Security companies have started detecting attacks that leverage a critical remote code execution (RCE) vulnerability in Windows, which Microsoft patched last week. On November 11th Microsoft has released that exploit the Unicorn (CVE-2014-6332) critical remote code execution vulnerability in Windows systems, which Microsoft patched on November 11th. The Unicorn vulnerability is addressed in one of the 14 security […]
Amnesty International launches Detekt tool to scan for state surveillance spyware on phones and PCs, it was developed by security expert Claudio Guarnieri. A group of security and technology experts that fight for the respect of human rights experts have launched a new tool dubbed Detekt that allow the detection of the government surveillance malware on […]
Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly under attack. The US Government is aware that nation’s energy grid is constantly under attack by state-sponsored hackers and cyber criminals. Recently The Department of Homeland Security (DHS) revealed that Russian hackers have infiltrated several critical […]
APT actors trying to use the G20 2014 summit as a lure to compromise Tibetan nongovernmental organizations (NGOs) with Gh0st RAT. Security experts at ESET uncovered a new series of cyber attacks that targeted Tibetan nongovernmental organizations (NGOs) concurrently with the G20 2014 summit in Brisbane, Australia. The experts discovered that APTs behind the attacks used a strain of the Gh0st RAT characterized […]
Microsoft on Tuesday released a rare out-of-band patch for a critical vulnerability in Kerberos that could allow elevation of privilege. Microsoft has just released an “out-of-band” security updates to patch a critical vulnerability in all supported versions of its Windows Server software, the flaw resides in Kerberos (Kerberos Checksum Vulnerability – CVE-2014-6324) and could allow elevation of Privilege […]
WhatsApp implemented the encryption by default on Android OS with the collaboration of the Open Whisper company. Soon it will be extended to other platforms. Many time security community has discussed about security of the popular messaging application WhatsApp, early 2014 experts at Praetorian discovered different security issues in the way WhatApp implements SSL, the principal one is the […]
The State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. The State Department has decided of shutting down its entire unclassified email system in response to a suspected cyber attack. A senior department official at the State Department, which reported the facts on […]
Thousands of patient records in UK are vulnerable to cyber fraudsters after up to 20 trusts under the National Hospital Service failed to extend security support for outdated Windows XP with Microsoft. Trusts running on the outdated OS risks reversed engineered attacks from hackers exploiting vulnerabilities on the unsupported OS. Hundreds of Thousands of Patient […]