1198 results
The monitoring of the criminal underground is essential to understand the dynamics of cybercrime and related offer on the black market. At fixed intervals I decided to take a look at what is happening in the underground black market analyzing how evolves its offer and the related sales models. In the last months it has been […]
Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research. Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw […]
Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks and applications benefit of even more complex devices that deeply interact with the owner, in this scenario […]
Today I desire to present the excellent work produced by freelance writer Gillian Holmes and the team of BackgroundCheck.org, as well know my readers I daily public only my posts, but I think that this work deserves a careful reading and I am sure will be of your benefit as it was for me … […]
Russian underground is considered one of the most prolific black market, it provides various services that allow cybercriminals to arrange sophisticated scams and provide all necessary tools to arrange a cyber attack. To get an idea of the main dynamics of a market so organized I suggest you follow the investigations of principal security firms […]
Zeus malware is considered the most popular and prolific malicious code for banking, it is one of the privilege agent by cybercrime the use to sell various customized version in the underground to conduct sophisticated frauds. Security community has found it in different occasion and anyway it was a surprice, the malware has evolved in […]
Every government conscious of strategic importance of cyber security and of the investments of other countries in cyber warfare capability is improving its effort. Last week I wrote about Russian government and the Putin’s request to reinforce the garrison of the fifth domain, the cyber space, through a series of investment to secure national critical infrastructures […]
Ten years, that is the time interval that has totally changed the worldwide perception for the role of hacker, these specialists were once seen as shady individuals to avoid, today they are highly sought professionals in both private business and government sectors. Which are the reasons for their success? The world has acquired awareness on […]
Technology in modern warfare has assumed a crucial role, every government is developing new cyber capabilities to be able to contrast and prevent cyber threats the fifth domain of warfare, the cyberspace. Today the concept of warfare is profoundly changed, many states choose to attack foreign governments exploring new technological options, from state-sponsored cyber attacks […]
Last week the hacker group known as “Izz ad-Din al-Qassam Cyber Fighters” announced a series of attacks against principal banking and financial institutions publishing a message on Pastebin profile. The principal targets include organizations such as U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks. In the period between the […]