In the last months of 2012 a group of hackers known as âIzz ad-Din al-Qassam Cyber Fightersâ conducted a series of attacks against principal banking and financial institutions including the U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks. Security experts noted that the hackers adopted an anomalous strategy for the […]
When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and […]
The Internet is full of news regarding malware more or less sophisticated that are used for various purposes, cybercrime, cyber espionage, hacktivism or cyber warfare but not all these agents demonstrated their efficiency over the time. This time thousands of UK companies have been targeted by a smart malware, dubbed âMagic Malwareâ,  that has gone undetected […]
As can be imagined and anticipated the soar of Bicoin value has attracted the interest of cybercrime, recently we read of malware authors and botmasters that trying to exploit new and old channels to steal virtual currency or mine it using computational resources of the victims. Security experts from Kaspersky Lab found variant of malware spread via […]
Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do well to ask themselves if their passwords are really strong and to make sure to donât use as username the word âadmin.â The reports published by CloudFlare and HostGator revealed a massive attack being launched against WordPress blogs […]
In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as spread channel the social media platforms or popular applications. The diffusion and management of a botnet architecture has never been so easy, the underground offer covers every need and provides advanced customization services. Security expert […]
The cybercrime industry knows no crisis, new services are offered in the underground and criminals operating in different sectors are increasing their interest in the possibility to adopt cyber tools to organize prolific scam and fraud. Underground offers everything necessary to commit a cyber crime, from tools for hacking services and in many cases all is […]
Botnet author are increasing complexity of the malicious code they use and at the same time security firms are adopting more sophisticated detection methods. Between principal concerns of botmaster the need to improve the capabilities of bot agents to operate silently and necessity to masquerade traffic from bots and Command & Control servers. Focusing on this […]
Not a day goes by that we’re talking about powerful cyber attacks and the sensational cyber espionage campaigns, the dangerous trend is also sustained by the increased offer of tools and services in the underground. Unfortunately the underground market is very dynamic and very difficult to monitor and to aggravate the situation is the leak […]
The news is circulating and this morning many colleagues called me to have more details on the event ⊠whatâs happening to the internet? All seems to be originated from a single DDoS attack against a unique company, but the event has reached unimaginable proportions with implications for the global network, in particular dragging down Internet […]