French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website stealing 1,3 customer records. Orange company was hit again by hackers, client database was breached by unknown attackers which have stolen the personal information on 1.3 million customers. According first news on the incident the hackers […]
Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited duration, and are arranged periodically, and … Incapsula firm has recently published a blog post to explain the efficiency of hit and run DDoS attacks, as remarked by the experts attackers donât need to arrange large scale […]
TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max Goncharov has published a new interesting study on the Russian Underground, titled Russian Underground Revisited, one year after the previous report “Russian Underground 101”. Trend Micro report continues its analysis of the services and products offered by cyber criminals in […]
Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures. Verizon firm provided the first data related to its annual report titled Verizon’s 2014 Data Breach Investigations Report (DBIR). The document reports specific sections around common incident patterns covering the bad actors, the techniques used, targets hit, timelines […]
A researcher discovered a flaw in the section “notes” of the social network Facebook that could be exploited by anyone to conduct a powerful DDoS attack. The Security researcher Chaman Thapa, also known as chr13, discovered a vulnerability in the section ‘Notes’ of the popular social network Facebook that could be exploited by anyone to launch the distributed denial-of-service (DDoS) […]
Eugene Kaspersky explained that SmartTV are vulnerable to malware-based cyber attacks, it’s a question of time to assist a large-scale infection. In the last months we discussed about possible infection through the Internet of Things, in particular, we focused on cyber attacks on home appliances including Routers, SmartTV, refrigerators and ovens. The number of smart devices […]
According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the cyber context. Extrotion is becoming a worrying inclination in the cyber criminal ecosystem, the number of targeted attacks that request money in change of a suspension of the hostilities and to give back to the victims […]
The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013. The NTT Innovation Institute has released the new Global Threat Intelligence Report (GTIR), a document structured to raise awareness of the rapidly evolving global threat landscape. The GTIR was based on threat intelligence and attack data from […]
Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to infect also iOS devices. Security analysts at SenceCy are monitoring the evolution for the Zorenium Bot, a new and unknown malware which has been advertised in the underground since January 2014. This is the third […]
Documents leaked by Snowden reveals that NSA has built a surveillance system capable of recording all the phone calls of a foreign country. The information on the surveillance capabilities of the National Security Agency is updated on a daily base and last news is that the agency has the necessary technology to record all the […]