Hacking

Pierluigi Paganini August 21, 2014
Operation Arachnophobia, targeted attacks from Pakistan

Operation Arachnophobia is a cyber espionage campaign originated in Pakistan descovered by experts from FireEye and ThreatConnect. Researchers from FireEye and ThreatConnect recently conducted a joint investigation on a series of targeted attacks that could be linked to the Pakistan. As explained by the experts the hacking campaign uncovered by experts is the demonstration that hackers […]

Pierluigi Paganini August 20, 2014
Nuclear Regulatory Commission hit by foreign hackers

Nuclear Regulatory Commission systems were hacked three times in the last three years. According to investigators the bad actors are foreign hackers. U.S. Nuclear Regulatory Commission (NRC) has been hit by cyber attacks three times during the past three years, bad actors behind the offensives have conducted spear phishing attacks to compromise the internal network […]

Pierluigi Paganini August 17, 2014
Grocery giants ALBERTSONS and SUPERVALU confirmed data breach

US Grocery giants ALBERTSONS and SUPERVALU have confirmed a data breach that could impact customers who acquired product in national stores. The Grocery giants Albertsons and SUPERVALU posted on Thursday a data breach notification related to an Incident Involving Payment Card Data Processing. Albertsons is the second largest grocery store chain in the US, meanwhile SUPERVALU is […]

Pierluigi Paganini August 16, 2014
HACIENDA, GCHQ Port Scanning Program on a wide-scale

New revelation on British GCHQ confirms the existence of the HACIENDA Port Scanning Program which is targeting systems in 27 countries. In the last years the British GCHQ has conducted numerous hacking operation against systems in 27 countries, through a massive port scanning the intelligence agency was searching for vulnerability to exploit in cyber attacks. […]

Pierluigi Paganini August 14, 2014
AdThief malware infected jailbroken Apple devices

Malware expert Axelle Apvrille explained how the iOS AdThief malware infected more than 75000 jailbroken iOS devices hijacking millions advertisements. More than 75,000 jailbroken iPhones have been infected by a Chinese malware which were used by cyber criminals to hijack nearly 22 million advertisements and steal revenue from developers on the iOS jailbreak community. The […]

Pierluigi Paganini August 13, 2014
Cisco EnergyWise suite vulnerable to Denial of Service attack

Researchers at BlackHat discovered a Denial of Service Vulnerability in Cisco IOS Software and Cisco IOS XE Software EnergyWise. Researchers from ERNW GMBH revealed that misconfigurations and vulnerabilities in Cisco’s EnergyWise suite could be exploited by attackers to cause huge blackouts. The team has presented the results of their study during the last Black Hat  conference […]

Pierluigi Paganini August 12, 2014
The network of USIS compromised by a cyber attack

Internal network of USIS was compromised by a cyber attack which has exposed Government Employees’ Data. Investigators speculate on a state-sponsored attack The USIS (U.S. Investigations Services), which provides background checks for the US government was recently hacked. This is the second data breach in a few months that threaten US government. The USIS recently acknowledged […]

Pierluigi Paganini August 12, 2014
Is the Blackphone really so easy to root? Probably no.

A security researcher claimed to have rooted the super secure Smartphone Blackphone in just five minutes. Is it true? What’s happened? Recently we read about the Blackphone, a super secure smartphone designed by SGP Technologies, a joint venture between Silent Circle and Spanish Geekphone, which is able to avoid surveillance of the NSA. The designer of Blackphone […]

Pierluigi Paganini August 11, 2014
F-Secure discovered Xiaomi handset spying on users’data

Experts at F-Secure security firm analyzing the new Xiaomi RedMi 1S discovered that it sends out to a server located in China a lot of user’s data. Xiaomi, one of the most important Chinese smartphone manufacturers is accused for secretly steal users’ data and send it back to a server in China, despite the company has turned […]

Pierluigi Paganini August 11, 2014
Sophisticated evasion techniques adopted in the Op Poisoned Hurricane

Researchers at FireEye have uncovered a new campaign dubbed Poisoned Hurricane characterized by the use of some clever techniques to avoid being detected. Security experts at FireEye revealed that several Internet infrastructure service providers in the United States and Asia, a financial institution, a government organization located in Asia and a US-based media company suffered […]