Wekby APT group leverages DNS requests for C2 communicationsWekby APT group leverages DNS requests for C2 communications

Wekby APT group leverages DNS requests for C2 communications

9 years ago

PaloAlto Networks has spotted a new campaign conducted by the Wekby APT that leverages on a malware that uses DNS…

A fourth bank hit by SWIFT hackers, are they backed by the DPRKA fourth bank hit by SWIFT hackers, are they backed by the DPRK

A fourth bank hit by SWIFT hackers, are they backed by the DPRK

9 years ago

A fourth Bank in Philippines was a victim of the SWIFT hackers and experts at Symantec confirmed the malware shares code…

How does ISO 27001 work?How does ISO 27001 work?

How does ISO 27001 work?

9 years ago

This article is an excerpt from the book Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your…

Hacker Interviews – Sneaker (GhostSec)Hacker Interviews – Sneaker (GhostSec)

Hacker Interviews – Sneaker (GhostSec)

9 years ago

Today I propose you an interview with Sneaker, one of the members of the GhostSec crew. The Sneaker is a very…

Installing rogue apps on iOS devices via SandJacking AttackInstalling rogue apps on iOS devices via SandJacking Attack

Installing rogue apps on iOS devices via SandJacking Attack

9 years ago

The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on…

Dozens of VISA HTTPS-protected sites vulnerable to Forbidden attackDozens of VISA HTTPS-protected sites vulnerable to Forbidden attack

Dozens of VISA HTTPS-protected sites vulnerable to Forbidden attack

9 years ago

  Dozens of HTTPS-protected websites belonging to Visa are vulnerable to Forbidden Attack, nearly 70,000 servers are at risk. A…

US-CERT: Leaked WPAD queries could expose corporate to MitM attacksUS-CERT: Leaked WPAD queries could expose corporate to MitM attacks

US-CERT: Leaked WPAD queries could expose corporate to MitM attacks

9 years ago

Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The…

Cheap DDoS for Hire services discovered on a Freelancer-finding siteCheap DDoS for Hire services discovered on a Freelancer-finding site

Cheap DDoS for Hire services discovered on a Freelancer-finding site

9 years ago

Incapsula experts Igal Zeifman and Dan Breslaw unmasked the availability of stresser and booter DDoS services on Fiverr website at…

Creators of the Nuclear EK are gaining nearly 100K USD each monthCreators of the Nuclear EK are gaining nearly 100K USD each month

Creators of the Nuclear EK are gaining nearly 100K USD each month

9 years ago

According to security experts at Check Point the creators of the Nuclear EK are gaining nearly 100K USD each month,…

Next-gen Tor is arriving and it will include a distributed random number generatorNext-gen Tor is arriving and it will include a distributed random number generator

Next-gen Tor is arriving and it will include a distributed random number generator

9 years ago

The researchers at the Tor project are working on a new distributed random number generator that will be included in…