Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the sender to collect very useful data on the recipient. Defending Against Spear Phishing, RAT Deployment and Email Tracking In my 2015:Year of the RAT Threat Report (see: http://www.snoopwall.com/reports/), Â I described how I felt Sony Pictures Entertainment (SPE) was attacked by […]
Topface, the Russian-based dating site, has been hacked, User names and e-mail addresses of 20 million visitors are offered for sale online. Nearly 20 Million User names and e-mail addresses of visitors to the Russian-based dating website Topface have been available for sale online, the news first reported by Bloomberg. According to Daniel Ingevaldson, chief technology […]
Davos World Economic Forum Annual Meeting 2015 – The elite of experts confirms the rising technological risks, notably cyber attacks. The World Economic Forum in Davos brings together some 2,500 of the top players in the sphere of politics, finance and business. The elite of experts meeting in Davos for the World Economic Forum Annual […]
Scammers are earning advertising revenue by spreading click-fraud malware Tubrosa, which sends compromised computers to their YouTube videos. A new Click-fraud malware campaign aimed at earning money by using the victim’s machine to view YouTube videos and benefits from ads embedded in them. The malicious campaign, discovered by experts at Symantec, has targeted users around the world […]
The French security expert Kafeine has discovered an unpatched vulnerability (0day) in Flash Player is being exploited by Angler Exploit Kit. The Angler exploit kit is one of the most popular crimeware kit and according to the French security researcher Kafeine it was enriched with a fresh Adobe Flash zero-day vulnerability. Kafeine has discovered a new variant of the Angler […]
Experts at Sucury firm have analyzed a malvertising scheme that has hijacked at least two distinct Google AdWords advertising campaigns. Malvertising campaigns are one of privileged attack vector exploited by criminal crews, their efficiency depends on the ability of attackers to compromise large audience channels. In September 2014 Malwarebytes firm discovered a large scale malvertising campaign exploiting Googleâs […]
Security Experts at Microsoft discovered a new variant of CryptoWall 3.0 ransomware that adopts I2P Anonymity Network for C&C Communications. A new version of CryptoWall ransomware has been detected in the wild by experts at Microsoft, just a week after I reported that Ciscoâs Talos Security Intelligence and Research Group detected a new strain of the same […]
Dell SecureWorks detected the Skeleton Key malware, which modifies authentication process on Active Directory (AD) systems protected by only passwords. The experts at Dell SecureWorks Counter Threat Unit(TM) (CTU) have recently discovered a malware dubbed Skeleton Key that bypasses single-factor authentication on Active Directory (AD) systems. The attackers can use to have total access to remote […]
The newborn Silk Road Reloaded black marketplace adopts I2P Anonymous Network and different virtual currency scheme to protect illegal business. The Operation Onymous conducted by law enforcement allowed the seizure of dozens of black markets on Tor Networks. While all the underground marketplaces in the DeepWeb, including Silk Road 2.0, went down due to the operation of […]
Security Experts at ESET firm discovered that Windigo campaign is still active and that bad actors are changing their tactics to remain under the radar. Windigo is a sophisticated malware-based campaign uncovered by security Experts at ESET in March 2014, hackers behind the campaign that exploited the Linux/Ebury backdoor compromising more than 500,000 computers and 25,000 dedicated servers. The […]