Cybercrime

Pierluigi Paganini September 05, 2015
Mozilla Bugzilla accessed, private flaws compromised since at least 2014

Mozilla said that data stolen from its bug tracking system was used to attack Firefox users in the wild, but attackers probably have had access since 2013. A threat actor that stole sensitive vulnerability information from the Mozilla’s Bugzilla bug tracking system last year has likely used it to target Firefox users. Mozilla explained that it did […]

Pierluigi Paganini September 04, 2015
New singular Android Ransomware relies on the XMPP protocol

A new variant of Android ransomware relies on the instant messaging protocol XMPP to establish a communication with C&C servers. According to security researchers at Check Point Software Technologies a new Android ransomware disguised as a video player app implements a method of communication different from any other similar threat. This Android ransomware is different from […]

Pierluigi Paganini September 01, 2015
Dozens dating websites got breached by Russian hackers

A huge number of individuals are in danger because of massive attacks by Russian hackers, total 97 websites have been broken and most of them are dating sites. Security experts at Hold Security discovered that a significant amount of websites, including dating portals like the Ashley Madison, has been targeted by massive attacks managed by Russian hackers. The […]

Pierluigi Paganini September 01, 2015
Agora Black Market fearing Tor vulnerabilities goes down

Agora black marketplace announced Tuesday evening that it will go temporary offline fearing the exploitation of the Tor flaws recently discovered. Operators of principal black markets are concerned about the real level of anonymity offered by the Tor network after the discovery of critical vulnerabilities affecting the anonymizing system. The administrators of the Agora black market, one […]

Pierluigi Paganini August 31, 2015
KeyRaider: iOS Malware targets over 225,000 Apple accounts

PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]

Pierluigi Paganini August 31, 2015
Corebot is the new data Stealer discovered by IBm’s X-Force

Corebot is a new data stealer discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their solutions. Corebot is the name of a new data stealer malware discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their product, the Trusteer Apex […]

Pierluigi Paganini August 30, 2015
Teenagers arrested after using the Lizard Squad DDoS tool

Six British teenagers have been arrested on suspicion of attacking websites by using the Lizard Squad’s DDoS tool, the Lizard Stresser. Lizard Squad is the popular hacking crew that brought the online gaming networks Sony PlayStation Network and Microsoft Xbox Live with major Distributed Denial-of-Service (DDoS) attacks. The hackers developed a tool dubbed Lizard Stresser that draws on Internet […]

Pierluigi Paganini August 28, 2015
FBI warns that Business Email Scams are raising

The FBI published an alert on the significant increase of the Business Email Scams (BEC), the number of victims is growing such as the financial losses. Yesterday the FBI warned the world that Business Email Scams (BEC) victims are growing, making companies losing money. The law enforcement highlights that frauds use to start with crooks […]

Pierluigi Paganini August 26, 2015
Be aware enterprises, it’s time to block Tor network

A research conducted by the IBM X-Force team reveals that a growing number of cyber attacks against big IT enterprises relies on the Tor network. With the increase of Tor-based attacks, something needs to change, and IBM is advising companies to start blocking Tor. A research conducted by the IBM X-Force team reveals that SQL […]

Pierluigi Paganini August 26, 2015
Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market, it operates entirely through the Tor network. A few days ago a new variant of the popular Zeus banking trojan was offered for sale on the black market, its name is Sphinx. Sphinx code is […]