Following the Hacking Team data breach, yet another Adobe Flash Player zero-day vulnerability has been found actively exploited in-the-wild. Another Flash Zero-Day: CVE-2015-5122 Yet another Adobe Flash Player zero-day has been found actively exploited in-the-wild. Thanks to the breach of the HackingTeamâs private files, another Adobe Flash zero-day has been made publicly accessible and hackers […]
Security Researchers at Trend Micro have discovered a second Zero-Day Vulnerability that arises from Hacking Team cyber attack. Just Three days ago, Adobe released a new version of Flash to patch the zero-day vulnerability that was disclosed as part of the Hacking Team hack. Security experts at Trend Micro confirmed that the Adobe Flash vulnerability […]
Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on investment. Hackers are seeing a whopping 1,425% return on investment for these two kinds of attacks Security experts at Trustwave published an interesting report on the return on investment related to illegal activities online. The experts revealed that […]
Law enforcement dismantled the Simda botnet in an international joint effort that involved also most important private security firms. Another joint operation conducted by law enforcement worldwide and private firms has dismantled the Simda botnet, investigators seized 14 Command and control servers, ten of which located in the Netherlands. Other C&C servers were located found […]
Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in todayâs world is the task of securing their organizationâs assets. While physical security is a huge component in ensuring that the residual risk level existing […]
Adobe has released yesterday an out-of-band update to fix a critical remote code-execution vulnerability CVE-2014-8439 in Flash Player that is being exploited in the wild. Adobe has released an emergency patch to patch a critical remote code-execution vulnerability (CVE-2104-8439) affecting Flash Player that was already fixed last month (Adobe’s Oct. 14th), but that was exploited […]
Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives to the attacker guarantee of success, state-sponsored hackers and cyber criminals consider zero-day exploits a precious resources around […]
We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last April 7th. The data on the cyber attacks reported by Israel government are really different from the one provided by the group of hacktivists in the damage report for #OpIsrael that account for a Total […]
The cybercrime industry knows no crisis, new services are offered in the underground and criminals operating in different sectors are increasing their interest in the possibility to adopt cyber tools to organize prolific scam and fraud. Underground offers everything necessary to commit a cyber crime, from tools for hacking services and in many cases all is […]
Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by Solutionary in the “2013 Global Threat Intelligence Report” (registration is required). The GTIR report provides insight into prevalent cyber threats identified in 2012 thanks […]