The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online hacking. Do you have used the Tormail Email service to protect your privacy? Are you searching for anonymity online? Well, the revelation regarding Tor Stinks project and many recent news on the spying activity discovered on Tor Traffic made […]
The cyber security expert Ebrahim Hegazy has found a Remote Code Execution vulnerability in a Yahoo server hosting numerous sub-domains. The cyber security expert Ebrahim Hegazy has found a serious flaw, as explained by the analyst the website is affected by a Remote Code Execution vulnerability. During the test Hegazy discovered first a Remote PHP Code […]
Danco Danchev profiled a new TDoS product sold in underground based on 3G USB modem/GSM/SIM card, cybercrime is increasing its interest in such attacks. When I desire to explore new DIY (Do It Yourself) tools I always refer Dancho Danchev, one of the most skilled experts of cybercrime ecosystem and underground market. Today I desire […]
One of the largest communities of Eastern Europe cybercriminals âVerifiedâ was hacked, more than 18,894 bad actors revealed after several hours. According to sources at IntelCrawler, cyberintelligence firm from Los Angeles, the largest community of Eastern Europe cybercriminals âVerifiedâ was hacked several hours ago. The hackers hit the online community stealing member information and […]
Dutch security firm Fox IT discovered an ongoing malware-based attack that hit thousands of Yahoo users via malicious ads. Users are alerted. Since the December 30th Yahoo website is proposing a malicious ad that was serving a malware, the discovery was made by Dutch security firm Fox IT. Visitors to the Yahoo website see the […]
Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with Dexter malware. At the end of 2012, Israel based company Seculert  notified about Dexter malware, used for parsing memory dumps of specific POS software related processes, looking for Track 1 / Track 2 credit card data. Dexter […]
Trusteer researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime forum. A new financial malware dubbed i2Ninja menaces banking, despite it has yet to be discovered in the wild, researchers at the IBM company Trusteer have found a sneaky piece of the malicious code on […]
At last HP’s Pwn2Own 2013 contest hacking teams from Japan and China compromised iPhone 5 running iOS 6 and iOS 7 and a Samsung Galaxy S4. During the last HP’s Pwn2Own 2013 contest at Information Security Conference PacSec 2013 in Tokyo, two teams of Chinese and Japanese hackers demonstrated the exploitation of zero-day vulnerability in Appleâs Safari browser for […]
Happy Birthday Security Affairs Two years ago I started Security Affairs for joke motivated by my passion in the security, day after day it is growing thanks to your affection and your precious support. I wish you were all here to hug you and have a coffee together, the Italians love coffee đ … Maybe […]
Security researcher Dancho Danchev profiled a new commercially modular malware platform recently released on the underground marketplace. A new commercially modular malware platform has been released on the underground marketplace, the news is posted by the security expert Dancho Danchev. Danchev recently observed a new modular malware platform specifically designed to provide a series of powerful features […]