The group of hacktivists Cyber Berkut hit several NATO websites with DDoS attacks while in the Crimea is being a referendum on annexation to Russia. Several NATO websites have been hit by cyber attacks while in the Crimea is being a referendum on annexation to Russia, the news has been reported by the principal media agencies […]
Syrian Electronic Army hacked the US CENTCOM and it is threatening to leak secret documents due US decision to hit Syria with electronic warfare attacks. Syrian Electronic Army (SEA) is the group of hackers that most of all is threatening the giants of the IT industry and media, the list of victims is very long (Facebook, Microsoft, NYT, […]
Security Researchers at Symantec detected a new Sophisticated Phishing Scam that is targeting the Google Docs Users with complex social engineering tricks. Phishing is still considerable as one of the major cyber threats, its impact on the IT industry is devastating considering that attackers are adopting new techniques even more sophisticated. Principal security firms and CERTs […]
A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats of Android device owners. The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert […]
TURBINE is the codename for a sophisticated hacking platform to take control of C&C servers managed by cybercrime. The NSA has been hijacking the botnets managed by cybercrime to its own purpose, this is the last revelation on questionable activities of the agency. Also this last revelation is based on documents leaked by Snowden, the news was […]
Replicant developers Kocialkowski has discovered a backdoor inside Samsung Galaxy which allows file access on the mobile’s storage. Android is the open source operating system most diffused, but being an open project, there are many customized versions that run on mobile devices. Almost every mobile phone manufacturer commercializes its devices with a version of the Android OS that […]
The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign. In the last weeks we have discussed about the Snake platform used in a large-scale cyber espionage campaign that targeted highly secured systems belonging to Governments and Military all over the world. Experts […]
Sucuri firm detected a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect amplification vectors. The security community is threatened by a new botnet composed at least 162,000 WordPress-powered websites abused to run DDoS attacks. The technique of attack allows to flood a target with requests sent by WordPress servers that received a […]
The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user’s traffic including access token. Facebook is vulnerable to Man-in-the-Middle Attack, The Egyptian penetration tester Ahmed Elsobky discovered a serious flaw that allows attackers to sniff user’s traffic including private information. “We’d actually received an earlier report from another researcher regarding this […]
Crimea – The Russian Cyber Strategy to Hit Ukraine The escalation of tension in Crimea is having repercussion also in cyberspace. Russia cyber strategy appears similar to the one adopted before the invasion of Georgia (2008) The year 2014 started with a diplomatic crisis in Crimes and Ukraine. The tension rose just after the 2014 Ukrainian […]