Security

Pierluigi Paganini October 15, 2014
Microsoft Fixes 3 Zero-day and many other flaws being exploited in the Wild

Microsoft has released 8 security bulletins as part of October 2014 Patch Tuesday, it patches 3 Zero-day flaws actively being exploited in the wild. Microsoft has released eight security bulletins on Tuesday as part of October 2014 Patch Tuesday, they fix dozens of vulnerabilities including the widely discussed zero-day flaw exploited by the Russian group of […]

Pierluigi Paganini October 15, 2014
POODLE attack on SSL menaces Internet, it’s time to disable it by default

The POODLE against SSL 3.0. A new attack on SSL is threatening the Internet again, it allows bad actors to decrypt traffic over secure channels. Another critical flaw affects one of the protocols most used to secure Internet traffic, Secure Sockets Layer (SSL) and attacker could exploit the attack dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption) to run a […]

Pierluigi Paganini October 15, 2014
ICS-CERT states that manufacturing organization compromised for several months

Last ICS-CERT MONITOR report reveals that hackers had access to the systems of an unnamed manufacturing organization for several months. According to the ICS-CERT MONITOR report, which summarizes the Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) activities between May – August 2014, threat actors had access to the systems of an unnamed manufacturing organization for […]

Pierluigi Paganini October 14, 2014
SandWorm hacking team exploited 0-day against NATO and other Government entities

iSIGHT Partners firm uncovered a Russian hacking team dubbed Sandworm that was running a cyber espionage campaign on NATO and other Government entities. According to a new report issued by the cyber security firm iSIGHT Partners a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on […]

Pierluigi Paganini October 13, 2014
WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks is also increasing. Cloud computing is considered an amazing opportunity for cybercrime, from the perspective of an attacher these powerful architectures have the necessary resources to conduct powerful attacks, and consider also that often the data archived in […]

Pierluigi Paganini October 12, 2014
Threat actors phishing for Intellectual property and source code from IT giants

FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to adopt new security model. Phishing is a common practice in the hacking community, despite the level of awareness of the threat is high, the efficiency of the attacks is still significant. As highlighted in the […]

Pierluigi Paganini October 11, 2014
Authentication vulnerability in PayPal mobile API allows access to restricted Accounts

An Authentication vulnerability in PayPal mobile API, discovered more than one year ago, allows access to restricted Accounts. Another authentication flaw affects PayPal mobile API, an attacker exploiting it could gain access to Blocked Accounts. The authentication restriction bypass vulnerability, resides in the mobile API authentication procedure of the PayPal online-service, according to Vulnerability Laboratory […]

Pierluigi Paganini October 10, 2014
Leaked programming manual inspired development malware for ATMs

A document on NCR ATM API Documentation disclosed on Baidu may have helped criminals to develop malware used in the recent attacks against ATMs worldwide. Recently Kaspersky Lab spotted a series of attacks on ATM machines which were infected by the Tyupkin malware, the malicious code is used by criminal organizations to compomise the banking machines […]

Pierluigi Paganini October 10, 2014
Reflection DDoS Attacks Continue to be dangerous in Q3 2014

The last report issued by Arbor ATLAS Shows an increase in Reflection DDoS Attacks in Q3 2014, specifically for SSDP reflection attacks. Arbor Networks has published the quarterly report on global DDoS attack data related to Q3 2014, the slides show the distributed denial of service (DDoS) attack trends for the first three quarters of 2013. The data […]

Pierluigi Paganini October 09, 2014
Reflections on Bash Bug case and evolution of IT security landscape

Security expert Boris Mutina made an analysis of IT Security landscape, highlighting critical trends and suggesting a proactive approach to cyber security The world of IT security was recently shocked by the Bash Bug vulnerability and I believe that none of the readers do need to explain the impact of this vulnerability. We are in […]