DDoS

15 million WordPress instances run flawed SEO plugin. Fix it!15 million WordPress instances run flawed SEO plugin. Fix it!

15 million WordPress instances run flawed SEO plugin. Fix it!

Security researchers at Sucuri firm have discovered multiple serious vulnerabilities in the popular ‘All In One SEO Pack’ plugin for…

11 years ago
Orange hacked for the second time in the year, 1,3M records exposedOrange hacked for the second time in the year, 1,3M records exposed

Orange hacked for the second time in the year, 1,3M records exposed

French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website…

11 years ago
Understanding Hit and Run DDoS attacksUnderstanding Hit and Run DDoS attacks

Understanding Hit and Run DDoS attacks

Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited…

11 years ago
Evolution of the Russian underground offerEvolution of the Russian underground offer

Evolution of the Russian underground offer

TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max…

11 years ago
Reading the Verizon Data Breach Investigation Report 2014Reading the Verizon Data Breach Investigation Report 2014

Reading the Verizon Data Breach Investigation Report 2014

Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures.…

11 years ago
How to abuse Facebook feature to conduct powerful DDoS attackHow to abuse Facebook feature to conduct powerful DDoS attack

How to abuse Facebook feature to conduct powerful DDoS attack

A researcher discovered a flaw in the section "notes" of the social network Facebook that could be exploited by anyone…

11 years ago
Kaspersky on SmartTV malware … it’s question of timeKaspersky on SmartTV malware … it’s question of time

Kaspersky on SmartTV malware … it’s question of time

Eugene Kaspersky explained that SmartTV are vulnerable to malware-based cyber attacks, it's a question of time to assist a large-scale…

11 years ago
The Extortion is a common practice in the cyber criminal ecosystemThe Extortion is a common practice in the cyber criminal ecosystem

The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…

11 years ago
Reading the Global Threat Intelligence Report (GTIR)Reading the Global Threat Intelligence Report (GTIR)

Reading the Global Threat Intelligence Report (GTIR)

The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013.…

11 years ago
New variant of Zorenium Bot can infect iOS devicesNew variant of Zorenium Bot can infect iOS devices

New variant of Zorenium Bot can infect iOS devices

Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to…

11 years ago