Hacking

Pierluigi Paganini October 31, 2017
Experts spotted a new strain of the Sage Ransomware that implements Anti-Analysis capabilities

Security experts from Fortinet spotted a new strain of the Sage ransomware that included new functionalities, such as anti-analysis capabilities. Sage 2.0 is a new ransomware first observed in December and not now it is distributed via malicious spam. Sage is considered a variant of CryLocker ransomware, it is being distributed by the Sundown and RIG exploit kits. The […]

Pierluigi Paganini October 31, 2017
FireEye releases GoCrack, a free managed Password Cracking Tool

Early this week FireEye released a managed password cracking tool, dubbed GoCrack, that is able to execute tasks across multiple GPU servers. Early this week FireEye released a managed password cracking tool, dubbed GoCrack, that is able to execute tasks across multiple GPU servers. GoCrack is an open source tool developed by FireEye’s Innovation and Custom Engineering […]

Pierluigi Paganini October 31, 2017
Vulnerabilities in Google Issue Tracker exposed details about unpatched flaws

A flaw in the Google Issue Tracker, also known as the “Buganizer,” might have exposed details about unpatched flaws listed in the database. A vulnerability in the Google Issue Tracker, also known as the “Buganizer,” might have exposed details about unpatched flaws listed in the database. The flaw was reported by the bug hunter Alex Birsan […]

Pierluigi Paganini October 30, 2017
iPhone Apps you granted camera access can secretly take photos and record video

A serious privacy issue in iPhone that could be exploited by iOS app developers to silently take your photos and record your live video by enabling cameras. Do you use an iPhone? If yes, there is probably something that you need to know about it! The Austrian developer and Google engineer, Felix Krause, has discovered a […]

Pierluigi Paganini October 30, 2017
Industrial Products of many vendors still vulnerable to KRACK attack

Many industrial networking devices from various vendors are still vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack). Many industrial networking devices are vulnerable to the recently disclosed KRACK attack (Key Reinstallation Attack), including products from major vendors such as Cisco, Rockwell Automation, and Sierra Wireless. A few weeks ago, researchers discovered several key management flaws […]

Pierluigi Paganini October 30, 2017
Hashcat 4.0.0 now can crack passwords and salts up to length 256

The new version of the tool, Hashcat 4.0.0 release is now available and includes the support to crack passwords and salts up to length 256. Hashcat is likely the world’s fastest password recovery tool that is released as free software. It is available for Windows, Linux and OS X, and it is distributed as CPU-based […]

Pierluigi Paganini October 29, 2017
Matrix Ransomware being distributed through malvertising

Security expert JĂ©rĂ´me Segura from Malwarebytes has spotted that Matrix Ransomware has risen again, it is now being distributed through malvertising. Malware researcher JĂ©rĂ´me Segura from Malwarebytes has discovered that Matrix Ransomware is now being distributed through malvertising campaign. https://twitter.com/EKFiddle/status/923660551095427072 The Matrix Ransomware was first spotted in 2016, in April 2017 the threat intelligence expert Brad Duncan uncovered the EITest campaign using […]

Pierluigi Paganini October 29, 2017
IOActive disclosed 2 critical flaws in global satellite telecommunications Inmarsat’s SATCOM systems

Flaws in Stratos Global AmosConnect 8 PC-based SATCOM service impact thousands of customers worldwide running the newest version of the platform that is used in vessels. Security researchers at IOActive have disclosed critical security vulnerabilities in the maritime Stratos Global’s AmosConnect 8.4.0 satellite-based shipboard communication platform. AmosConnect 8 is a PC-based SATCOM service, introduced in 2010, […]

Pierluigi Paganini October 28, 2017
Mysterious hack allows attackers stealing Windows login credentials without user interaction

Microsoft fixed a vulnerability that could allow hackers to steal Windows login credentials without any user interaction. Microsoft fixed a serious vulnerability that could allow attackers to steal Windows NTLM password hashes without any user interaction. The tech giant patched the issues only for recent versions Windows (Windows 10 and Server 2016), to trigger the flaw […]

Pierluigi Paganini October 27, 2017
Digging the Middle East and North African cybercrime underground market

Security experts from Trend Micro have published an interesting report on the Middle East and North African cybercrime underground market, enjoy it! We explained several times that criminal communities adopt different tactics, techniques, and procedures (TTPs) depending on the location they operate. Experts at Trend Micro have highlighted the differences between the different underground communities, they […]