1198 results
This is a sad day for me, my friend and colleague Martin Dipo Zimmermann is passed away after suffering an heart-attack. Martin was the Chief Technical Officer and co-founder of the Cyber Threat Intelligence Network, I was working with him and other colleagues to threat intelligence activities. Martin was the Chief Technical Officer and co-founder of the […]
Researchers discover a vulnerability in Linux operating systems dubbed Grinch Bug, which is exploited to give malicious hackers Root access to a computer system. The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel. A new privilege escalation bug similar to shellshock is giving Linux administrators sleepless nights just days after […]
Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was designed to encourage youngsters to tackle emerging cyber security threats, the Agency made it available to download today. The Cryptoy mobile app was developed by […]
Shockingly, for the last five years, hackers have been using a banking malware to siphon unencrypted credit/debit card information from the computer networks of Charge Anywhere, an electronic payment service used by millions of merchants worldwide. Charge Anywhere, an electronic payment service provider to merchant publicly admitted to a security breach that may have compromise […]
Apple’s Mac OS X is no longer immune to malware and bugs says Kaspersky Security Lab.A survey of 2014 reveals that more malware attacks targeted Mac. For years, Mac OS X has been flaunted as the most immune OS to malwares and bugs. Well, the reign of Mac might end in 2014, with users’ on […]
FIN4 hacking team has targeted over 100 organizations since 2013, all of which are either publicly traded companies or advisory firms. Researchers at FireEye issued a report on a hacking crew dubbed FIN4 which is specialized in hacking of publicly traded companies with the intent to steal sensitive data, including mergers and acquisitions intelligence. ” FIN4 has pursued targets at more than […]
The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime. Excerpt from a detailed analysis published on the Infosec Institute In this phase it is quite impossible to attribute precisely the development of the Regin malware to a specific category of threat actors. Until now we […]
Cybercriminals have been making generous donations to the charity organization as a way of verging stolen credit data and pushing up sales in dark web online bazaars. Researcher at PhishLabs unearthed an automated card verification bot that make it easier for underground carders to ascertain the value of stolen card data. Black Friday and Cyber […]
As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year. Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. It’s the end of the year, a perfect time to look […]
The Digital Citizens Alliance Security provided data related to the growth of dark markets like Evolution after the operation Onymous operated by police. Recently law enforcement in a joint effort against cybercrime, dubbed operation Onymous, seized dozens of black markets on Tor Networks. While all the the underground marketplaces in the DeepWeb, including Silk Road 2.0, went […]