Hacking

Pierluigi Paganini May 27, 2016
A fourth bank hit by SWIFT hackers, are they backed by the DPRK

A fourth Bank in Philippines was a victim of the SWIFT hackers and experts at Symantec confirmed the malware shares code with tools used by the Lazarus group. The list of banks victims of the SWIFT hackers is lengthening, a fourth bank in the Philippines has been a victim of the crew that targeted the SWIFT interbank transfer system. […]

Pierluigi Paganini May 27, 2016
Installing rogue apps on iOS devices via SandJacking Attack

The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on iOS devices. The security expert Chilik Tamir from Mi3 Security has devised some new attack methods that can be exploited by threat actors to install malicious apps on non-jailbroken iOS devices. Tamir presented his attack methods at […]

Pierluigi Paganini May 26, 2016
Dozens of VISA HTTPS-protected sites vulnerable to Forbidden attack

  Dozens of HTTPS-protected websites belonging to Visa are vulnerable to Forbidden Attack, nearly 70,000 servers are at risk. A new attack technique dubbed ‘Forbidden attack’ expose dozens of HTTPS Visa sites vulnerable to cyber attacks and roughly another 70,000 servers are at risk. A group of international researchers (Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, […]

Pierluigi Paganini May 26, 2016
US-CERT: Leaked WPAD queries could expose corporate to MitM attacks

Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The U.S. Computer Emergency Readiness Team(US-CERT) issued the Alert (TA16-144A) to warn of leaked WPAD queries could result in domain name collisions with internal network naming schemes. The WPAD queries are intended for resolution on private or enterprise DNS […]

Pierluigi Paganini May 26, 2016
Cheap DDoS for Hire services discovered on a Freelancer-finding site

Incapsula experts Igal Zeifman and Dan Breslaw unmasked the availability of stresser and booter DDoS services on Fiverr website at very affordable prices. The Freelancer-finding site Fiverr is offering DDoS attacks-as-a-service for just five dollars. The site connects professionals that offer any kind of services to buyers. If you are searching for a developer to hire, […]

Pierluigi Paganini May 26, 2016
Creators of the Nuclear EK are gaining nearly 100K USD each month

According to security experts at Check Point the creators of the Nuclear EK are gaining nearly 100K USD each month, most victims are in Europe and US. Most people interested working with a cloud business model nowadays, even malware programmers. It is better than just one time selling a security exploit, authors of malware are […]

Pierluigi Paganini May 25, 2016
Hacker Interviews – Speaking with Samy Kamkar

Today I want to share you my interview with one of the greatest white hat hackers in the IT Security Industry, the ingenious Samy Kamkar. Samy Kamkar (@SamyKamkar) is one of the most prolific experts that periodically presents new astonishing creations to the IT security industry. Most of you will remember for sure MagSpoof, Combo Breaker, SkyJack, OwnStar, OpenSesame, […]

Pierluigi Paganini May 25, 2016
LinkedIn breach from 2012 still haunting the security community

A data breach suffered by LinkedIn back in 2012 is still haunting the security community. In 2012, LinkedIn suffered an attack heard around the professional world.  The social networking site that caters to professionals and their social peer groups suffered and breach of nearly 6.5 million users.  The attack was attributed to Russian hackers who […]

Pierluigi Paganini May 24, 2016
FBI warns of KeySweeper keystroke loggers disguised as USB phone chargers

The FBI issued a notification warning actors in the private sector about a rapid diffusion of KeySweeper, a keystroke loggers disguised as USB phone chargers. The FBI is warning actors in the private sector about a rapid diffusion of stealthy keystroke loggers disguised as USB phone chargers. The FBI issued a Private Industry Notification warning of the […]

Pierluigi Paganini May 24, 2016
Operation Ke3chang, alleged Chinese hackers target Indian Embassies Worldwide

Security experts from PaloAlto Networks collected evidence that the Operation Ke3chang discovered by FireEye in 2013 is still ongoing. Back in 2013, the security researchers at FireEye spotted a group of China-Linked hackers that conducted an espionage campaign on foreign affairs ministries in Europe. The campaign was named ‘Operation Ke3chang,’ now threat actors behind the […]