search

Date range
Filters

1195 results

Pierluigi Paganini May 13, 2016
SWIFT announced that a second bank was a victim of cyber heist

The SWIFT announced that a second commercial bank was a victim of a cyber heist, the crime appears to be part of a broad online attack on global banking. A second malware-based attack hit the SWIFT (Society for Worldwide Interbank Financial Telecommunications) system. The news was spread by the SWIFT on Thursday, the attack has many similarities with […]

Pierluigi Paganini May 12, 2016
Old flaw exposes SAP BUSINESS Applications across the world

Security experts collected evidence that up to 36 global organizations have been hacked via exploits against an old flaw in SAP Business Applications A five-year-old flaw in SAP software is threatening business worldwide, at least 36 global organizations have been hacked via exploits used to trigger a vulnerability in SAP Business Applications. The flaw resides on […]

Pierluigi Paganini May 09, 2016
The hidden information behind 12,000 PoC Exploits shared online

A study conducted by Recorded Future on PoC exploits shared online over the last year shows that social media is the main distribution channel. Security experts at the threat intelligence firm Recorded Future have conducted an interesting study on the proof-of-concept exploits shared online (e.g. On Twitter, on forum linking to personal blogs, GitHub, or Pastebin) last year. […]

Pierluigi Paganini May 09, 2016
2015 intelligence transparency report, the surveillance is still nosey

According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have almost doubled since 2013 If you believe that the Snowden‘s revelations have stopped or limited the surveillance activities you are obviously wrong. The diffusion of the technology and the increasing threats of espionage and terrorism is […]

Pierluigi Paganini May 08, 2016
How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities in software, websites, and web applications as attack vectors, hosting malicious components in cloud services. Other than this if there’s any service getting launched in the future, there will be always chances of abuse. Experts […]

Pierluigi Paganini April 30, 2016
Did you buy on AlphaBay?Someone may have accessed your info

A security vulnerability in AlphaBay, one the most popular black markets, could expose private messages and data of its users. One of the most popular black marketplaces, the AlphaBay, is affected by a serious flaw that could expose the private messages of its users. One year ago the operators behind the black market launched a fully automatic credit […]

Pierluigi Paganini April 30, 2016
Analyzing Cyber Capabilities of the ISIS

The data intelligence firm Flashpoint has published an interesting report that explore the cyber capabilities of the ISIS radical group. In the last days of April, Flashpoint a global leader in Deep and Dark Web data and intelligence published a report that is dedicated to the analysis of cyber capabilities of the ISIS with the […]

Pierluigi Paganini April 28, 2016
PLATINUM APT targeted organizations in South and Southeast Asia

Microsoft issued a detailed report on the activity of the hacking crew dubbed Platinum APT group that leveraged a Windows patching system in its attacks. The hacker crew discovered by Microsoft and dubbed Platinum APT group conducted cyber espionage against organizations in South and Southeast Asia leveraging a Windows patching system. According to Microsoft, the Platinum has […]

Pierluigi Paganini April 22, 2016
JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you shilly-shally to pay the ransom. A new crypto-malware has appeared in the wild, its name is JIGSAW ransomware. The BitcoinBlackmailer.exe explains JIGSAW ransomware will encrypt your files adding ‘.FUN’ extension. The author, in the Saw-movie […]

Pierluigi Paganini April 20, 2016
Anonymous presented OnionIRC, a chat service in the Dark Web

Anonymous announced OnionIRC, a new chatroom in the DarkWeb dedicated to teaching hacking and coding techniques and encryption mechanisms. Anonymous, the most popular collective of hacktivists, has announced a new chatroom in the DarkWeb dedicated to teaching its sympathizers hacking and coding techniques and encryption mechanisms. onionirchubx5363 . onion Port 6667 SSL: Port 6697 — Anonymous (@OnionIRC) […]