Hacking

Pierluigi Paganini November 13, 2017
A China-linked cyber espionage group has been using a new strain of malware dubbed Reaver

Experts at Palo Alto Networks have discovered a new malware family named Reaver with ties to hackers who use the SunOrcal malware. A China-linked cyber espionage group has developed a new strain of malware, dubbed Reaver, that was already observed in highly targeted attacks during 2016. The malware was analyzed by experts at Palo Alto Networks, who spotted […]

Pierluigi Paganini November 13, 2017
Bug bounty programs and a vulnerability disclosure policy allowed Pentagon fix thousands of flaws

Bug bounty programs allowed the US agency to receive 2,837 valid bug reports from 650 white hat hackers located in 50 countries around the world. Bug bounty program ‘Hack the Pentagon’ launched by the Pentagon in 2016 along with the vulnerability disclosure policy announced nearly one year ago allowed the US agency to receive 2,837 valid bug reports […]

Pierluigi Paganini November 13, 2017
DHS – Tests demonstrate Boeing 757 airplanes vulnerable to hacking

Researchers and private industry experts, along with DHS officials, remotely hacked a Boeing 757 airplane that was parked at the airport in Atlantic City. A group of researchers and private industry experts, along with DHS officials, remotely hacked a Boeing 757 airplane owned by the DHS that was parked at the airport in Atlantic City, […]

Pierluigi Paganini November 12, 2017
Microsoft president urges a digital Geneva Convention, we agree

Microsoft president Brad Smith appeared before the UN in Geneva to talk about the urgency of a digital Geneva Convention. Microsoft president Brad Smith appeared before the UN in Geneva to talk about the role of nation-state actors in the threat landscape. We are assisting a growing number of nation-state cyber attacks, for this reason, cybersecurity […]

Pierluigi Paganini November 12, 2017
Avira spotted a new strain of the dreaded Locky Ransomware in the wild

Avira firm detected a new strain of the Locky ransomware that is spreading through malicious attachments disguised as legitimate Libre and Office documents. Researchers at Avira Virus Lab detected a new strain of the Locky ransomware that is spreading through malicious attachments disguised as legitimate documents from productivity applications like Microsoft Word and Libre Office. The new Lock […]

Pierluigi Paganini November 11, 2017
Equifax earnings release: Security breach related expenses cost $87.5 Million in Q3

Equifax announced during the third quarter of 2017, it incurred $87.5 million in expenses related to the cyber attack that was reported in September. It is very difficult to estimate the overall losses caused by a cyber attack because victims incur in direct and indirect costs that aren’t easy to calculate. This week the credit reporting […]

Pierluigi Paganini November 11, 2017
Ethereum Parity Wallet freeze that locked up $280 million in Ether was a hack, claims Cappasity

According to the startup Cappasity the Ethereum Parity Wallet freeze that locked up $280 million in Ether was deliberately triggered by someone. A few days ago the firm Parity Technologies made the headlines because someone has accidentally triggered a vulnerability in the popular Parity Wallet that locked up $280 million in Ether, including $90 million raised by Parity […]

Pierluigi Paganini November 11, 2017
#AVGater attack abuse Quarantine vulnerabilities for privilege escalation

The security experts Florian Bogner devised a method dubbed AVGater to escalate privileges by abusing the quarantine feature of some antiviruses. Several popular antivirus solutions are affected by flaws that could be exploited by attackers to escalate privileges on a compromised system by abusing the quarantine feature. The security experts Florian Bogner devised a method dubbed AVGater to escalate […]

Pierluigi Paganini November 10, 2017
TOASTAMIGO – the first known strain of malware that uses the Toast Overlay exploit

Trend Micro spotted TOASTAMIGO, the first known malware that uses the recently patched vulnerability that ties with the Toast Overlay attacks. Malware researchers at Trend Micro have spotted the first known strain of malware that triggers the recently patched vulnerability, tracked as CVE-2017-0752, that ties with the Toast Overlay attacks. The vulnerability was discovered in September by security […]

Pierluigi Paganini November 10, 2017
Experts explain the Return on Investments in the cybercriminal underground

How much is the return on investment in the cybercriminal underground? Let’s dig a report recently published by threat intelligence firm Recorded Future to find the answer. Cybercrime is a profitable business and the returns of investments can be enormous, this is what emerged from another interesting research of the threat intelligence firm Recorded Future. […]