search

Date range
Filters

1195 results

Pierluigi Paganini December 29, 2016
Dreaded KillDisk Malware now includes Ransomware abilities

Researchers at security firm CyberX have recently discovered a variant of the KillDisk malware that also implements ransomware features. KillDisk is a malware that has been used in attacks against industrial control systems (ICS), it was developed to wipe the hard drives of the infected machine in order to make it inoperable. The new variant is […]

Pierluigi Paganini December 26, 2016
The Turkish Government is investigating more than 10,000 people in terror probe

The Turkish Government is investigating 10000 people suspected of terror-related activity on the internet,accused of propaganda or apologizing for terrorism The Turkish authorities are investigating more than 10000 individuals over online terror activities. The suspects are accused of being responsible for the sharing of material and post against government officials. According to the Interior Ministry, […]

Pierluigi Paganini December 11, 2016
Georgia traced an attempted breach of voter registration database to DHS

Georgia’s secretary of state, Brian Kemp, revealed that voter registration database was targeted by hackers with IP address linked to the DHS. While President Barack Obama has ordered US intelligence agencies to deeper investigate the alleged Russian interference with the 2016 Presidential Election, Georgia announced it’s traced an attempted breach of the state’s voter registration database to the DHS. […]

Pierluigi Paganini December 08, 2016
Floki Bot rapidly evolves and targets also PoS data

Cisco Talos and Flashpoint have teamed up to analyze the Floki Bot, a Zeus-based banking Trojan that is rapidly evolving in the cybercrime underground. Security researchers from Cisco Talos and Flashpoint have conducted an investigation of the Floki Bot in a joint effort. The Floki bot is a banking Trojan based on Zeus that has […]

Pierluigi Paganini December 06, 2016
Adobe Flash Player flaws remain the most used by Exploit Kits

Experts from the firm Recorded Future published a report on the most common vulnerabilities used by threat actors in the exploit kits. Recorded Future published an interesting report on the most common vulnerabilities used by threat actors in the exploit kits. The experts observed that Adobe Flash Player and Microsoft products (Internet Explorer, Silverlight, Windows) continue […]

Pierluigi Paganini December 04, 2016
US Presidential commission presents recommendations on cybersecurity

The US Commission on Enhancing National Cybersecurity, tasked by President Barack Obama, issued its final report with recommendations on cybersecurity. Cyber security is a primary issue in the agenda of many countries, the U.S. Presidential commission has recently issued recommendations to urge a proactive cooperation between private and public sectors. The collaboration aims to improve the security […]

Pierluigi Paganini December 02, 2016
The Immaterial Khilafah – Global Intelligence Insight Report

As the coalition forces started to enter the Iraqi city of Mosul, many have seen Al-Baghdadi’s speech as desperate plea, exhorting his fighters to stand and fight for the Caliphate until their dying breath while he was cowardly running away from the fray. “Turn the disbelievers’ night into day, bring destruction to their homes, make […]

Pierluigi Paganini November 21, 2016
An Android Spyware revealed the existence of a new Italian surveillance firm

A strain of Android spyware recently analyzed by security experts from RedNaga Security team points to an another Italian company. A new strain of Android malware reveals the existence of a new Italian player in the surveillance landscape. The Android spyware was analyzed by researchers from the RedNaga Security team, that is a first time […]

Pierluigi Paganini November 16, 2016
CVE-2016-4484 Hold down the Enter key for 70 sec to gain a Linux Root shell

The CVE-2016-4484 vulnerability can be exploited to gain a Linux Root shell by simply pressing the Enter Key for 70 Seconds. It could be quite easy to bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds. In this way, it is possible to open a shell […]

Pierluigi Paganini October 16, 2016
Security Affairs newsletter Round 82 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! Cisco warns of critical vulnerabilities in CISCO Nexus switches Authorities warn of cyber threat related […]