Hacking

Pierluigi Paganini December 04, 2013
Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio signals. The shocking news that it is possible to infect a computer with Inaudible Audio signals is circulating within the security community has been circulating for several weeks between denials and confirmations. In October the […]

Pierluigi Paganini December 03, 2013
D-Link upgrades its firmware to fix backdoor presence

D-Link company has recently released a new version of firmware to fix backdoor vulnerability in various network device models. Last October the security expert Craig Heffner discovered a backdoor inside different D-Link routers. Craig published an interesting blog post on “/dev/ttyS0″ on the reverse engineering of the backdoor (CVE-2013-6027) present in many D-Link devices, it described how […]

Pierluigi Paganini December 03, 2013
The fundamentals of Google Hacking

Rafael Souza (CISOof hackers online club) introduces the fundamentals of Google Hacking ABSTRACT Readers, I introduce a little about a very interesting technique that is Google Hacking, is a key to investigate if we are doing a pentest, or protecting our organization or individual item. Google Hacking is the activity of using the site search […]

Pierluigi Paganini December 02, 2013
Potentially Unwanted Programs secretly serve Bitcoin miner

Security experts at Malwarebytes discovered Potentially Unwanted Programs like Toolbars and Search Agents that installed Bitcoin miners on user’s PC The value of the Bitcoin for a few days has passed the psychological threshold of one thousand dollars, confirming its growth trend, the attention in the virtual currency scheme is at the highest levels and […]

Pierluigi Paganini December 02, 2013
Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet

Iranian report states that Israel and Saudi Arabia are plotting new computer cyber weapon to sabotage the Iranian nuclear program like happened with Stuxnet. Saudi spy agency, Mossad are collaborating in the design of malware worse than Stuxnet. The Fars agency reported that Israel and Saudi Arabia have started a joint collaboration for the development […]

Pierluigi Paganini December 01, 2013
MS Windows XP CVE-2013-5065 Eleventh zero-day flaw found by FireEye

FireEye Security Experts discovered Microsoft Windows XP and Server 2003 privilege escalation zero-day exploit Security experts at FireEye have discovered a new zero-day, a privilege escalation vulnerability in Windows XP and Windows Server 2003. It’s is the eleventh vulnerability discovered by FireEye this year, really a great job for the researchers of the young company. The last zero-day flaw is coded […]

Pierluigi Paganini November 30, 2013
Vodafone Iceland data breach exposed 70000 user personal information

Today the official Vodafone Iceland was breached by group of hackers Maxn3y, left defaced and a heap of data leaked from its servers. Vodafone Iceland was hacked by the group of hackers Maxn3y (@AgentCoOfficial) who in the past has stolen data from  airports’ systems, electronic giants and fast food company. The hackers announced via Twitter […]

Pierluigi Paganini November 28, 2013
Ruby on Rails CookieStore flaw exposes thousand of websites

A security issue inside cookie-based storage mechanism of Ruby on Rails could expose thousand websites to cyber attacks. Ruby on Rails,  “hit an open source web application framework to compromise a wide audience”, this is the thought of attackers that desire who want to hack the highest number of web sites. A security issue inside […]

Pierluigi Paganini November 27, 2013
New crimekit Atrax exploits Tor, mines Bitcoin and much more

Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features including Bitcoin mining. Atrax is the name of the last crimekit that is sold in the underground market, its particularity is the capability to exploit Tor networks to communicate with Command & Control infrastructure. Jonas […]

Pierluigi Paganini November 26, 2013
Why do we need for Incident Response plan?

Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing an incident response plan. FireEye firm published an interesting post on the need of incident response (IR) capabilities to reply numerous cyber  attacks that daily hit almost any web service. Starting from the data proposed […]