Hacking

Pierluigi Paganini June 03, 2015
APWG Global Phishing Survey – Registered malicious domains increased in H2 2014

The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope of the global phishing problem. The Anti-Phishing Working Group (APWG) has published the “Global Phishing Survey 2H2014“, a report that comes with some interesting numbers on phishing activities. The Global Phishing Survey 2H2014 report states […]

Pierluigi Paganini June 03, 2015
Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]

Pierluigi Paganini June 03, 2015
Torus, a milestone in massive surveillance

“Torus” a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes alliance. The researcher Duncan Campbell analyzed a document leaked by the NSA whistleblower Edward Snowden focusing his investigation on the a term used in the secret slides that could have revealed a massive increase in the […]

Pierluigi Paganini June 02, 2015
Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the German Parliament. The German Government has confirmed that hackers who breached the Bundestag systems a couple of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, Germany’s parliament, confirmed that unknown […]

Pierluigi Paganini June 01, 2015
Mac zero-day makes rootkit infection very easy

A security researcher discovered a zero-day vulnerability in many Mac firmware that could allow an easy installation of an EFI rootkits. The cyber security expert Pedro Vilaça has discovered a low-level zero-day vulnerability in Apple Mac systems that could be exploited by privileged users to more install an EFI rootkits. Vilaça explained that the attack is […]

Pierluigi Paganini June 01, 2015
Google blocks Chrome extensions out of the official Store

The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not available on the Chrome Web Store. With new policies […]

Pierluigi Paganini June 01, 2015
US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are increasing. Financial industry in US maintains symptoms of persistent cyber-attacks among surprising cyber incidents and large-scale data breaches that compromised confidentiality, integrity and availability of user’s information. Several advanced hacking methods and the exploitation of zero-day flaws […]

Pierluigi Paganini June 01, 2015
How to hack a Parking Management System and why?

The security researcher Jose Guasch revealed that dozens of “smart” parking management systems worldwide could be easily hacked. Everything is always online is inevitably exposed to the risk of cyber attacks, the security researcher Jose Guasch at the hacking conference Hack In The Box has explained that dozens of “smart” Parking Management System worldwide could be easily hacked. Guasch explained that […]

Pierluigi Paganini May 31, 2015
The Importance of Operational Security and User Education

An overview of the principal issues related to the 3 general categories that security controls fall under; physical, technical, and operational controls. What is Layer 8? Layer 8 is a term utilized by information security professionals and techies in general that represents the weakest link of every organization: the users.  While an organization may be […]

Pierluigi Paganini May 31, 2015
Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks

Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry of Foreign Affairs. The hacking crew known as the Yemen Cyber Army is continuing its campaign against the Government of Saudi Arabia. The Yemen Cyber Army (YCA) has released other data from the stolen archived belonging to the Saudi […]