Cybersecurity

Pierluigi Paganini January 15, 2014
TDoS products evolution in the underground market

Danco Danchev profiled a new TDoS product sold in underground based on 3G USB modem/GSM/SIM card, cybercrime is increasing its interest in such attacks. When I desire to explore new DIY (Do It Yourself) tools I always refer Dancho Danchev, one of the most skilled experts of  cybercrime ecosystem and underground market. Today I desire […]

Pierluigi Paganini December 19, 2013
OPSEC novice … here the manual for perfect cyber criminals

Cyber security expert Dancho Danchev profiled a new OPSEC training services in the underground, a new trend that is converging to standardization of knowledge sharing in the cybercrime ecosystem. Speaking of cybercrime, with the term OPSEC are usually referred the basic operational security activities conducted by cyber criminals to avoid being tracked and monetize their […]

Pierluigi Paganini November 13, 2013
TrendLabs Q3 Security Roundup on illegal activities

TrendLabs has just published the third quarterly report, titled The Invisible Web Unmasked, on the evolution of cybercrime observed in recent months. TrendLabs have published an interesting report titled titled “The Invisible Web Unmasked” to provide a picture of cybercrime evolution observed in recent months. The takedown of the virtual currency Liberty Reserve, the seizure […]

Pierluigi Paganini November 11, 2013
FireEye has identified a new IE zero-day exploit

FireEye Labs has identified a new IE zero-day exploit used for a watering hole attack in the US. As usual it is crucial to track and mitigate so dangerous threats in time to avoid serious problems. FireEye Labs has detected a new series of attacks based on the exploit of a new IE zero-day vulnerability […]

Pierluigi Paganini October 29, 2013
Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business intelligence. Once chosen the target it is important to gather business information on it before […]

Pierluigi Paganini October 28, 2013
Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack. Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on […]

Pierluigi Paganini October 27, 2013
Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy sector this trend is very concerning. Let’s follow the discussion on the hacking world and the way hackers impact business with their activities. We discussed about the role of hackers for companies and their employment […]

Pierluigi Paganini May 20, 2013
WSIS Forum 2013 – Securing Cyberspace in a borderless world

“Securing Cyberspace in a borderless world: Vision 2015 and Beyond” is the title of a High Level Dialogue that was held during The World Summit on the Information Society Forum (WSIS) 2013. The World Summit on the Information Society Forum (WSIS) represents the world’s largest annual gathering of the ICT for development  community, the event is organized […]

Pierluigi Paganini May 13, 2013
The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]

Pierluigi Paganini March 22, 2013
CNCERT – China is also a victim of cyber attacks

Recent cyber attacks against North and South Korea are inflaming the debate on the importance of cyber security, governments are massively investing in the improvement of cyber capabilities to be prepared to mitigate the increasing number of offensives. China is considered the most aggressive state, according principal security firms and cyber experts, from its country […]