The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope of the global phishing problem. The Anti-Phishing Working Group (APWG) has published the “Global Phishing Survey 2H2014“, a report that comes with some interesting numbers on phishing activities. The Global Phishing Survey 2H2014 report states […]
Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]
“Torus” a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes alliance. The researcher Duncan Campbell analyzed a document leaked by the NSA whistleblower Edward Snowden focusing his investigation on the a term used in the secret slides that could have revealed a massive increase in the […]
The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the German Parliament. The German Government has confirmed that hackers who breached the Bundestag systems a couple of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, Germany’s parliament, confirmed that unknown […]
A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI rootkits. The cyber security expert Pedro Vilaça has discovered a low-level zero-day vulnerability in Apple Mac systems that could be exploited by privileged users to more install an EFI rootkits. Vilaça explained that the attack is […]
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. With new policies […]
US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are increasing. Financial industry in US maintains symptoms of persistent cyber-attacks among surprising cyber incidents and large-scale data breaches that compromised confidentiality, integrity and availability of user’s information. Several advanced hacking methods and the exploitation of zero-day flaws […]
The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always online is inevitably exposed to the risk of cyber attacks, the security researcher Jose Guasch at the hacking conference Hack In The Box has explained that dozens of “smart” Parking Management System worldwide could be easily hacked. Guasch explained that […]
An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and operational controls. What is Layer 8? Layer 8 is a term utilized by information security professionals and techies in general that represents the weakest link of every organization: the users. While an organization may be […]
Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry of Foreign Affairs. The hacking crew known as the Yemen Cyber Army is continuing its campaign against the Government of Saudi Arabia. The Yemen Cyber Army (YCA) has released other data from the stolen archived belonging to the Saudi […]