malware

Pierluigi Paganini October 13, 2015
NSA SHARKSEER program aims to detect and mitigate malware Zero-Day

The NSA SHARKSEER Program is a project that aims to detect and mitigate web-based malware Zero-Day and Advanced Persistent Threats using COTS technology. Every day, thousands of cyber attack rely on exploitation of zero-day exploits, even more sophisticated ATP groups trigger unknown vulnerabilities to compromise systems across the world. Intelligence agencies and research groups are investing […]

Pierluigi Paganini October 11, 2015
The Dark web – Why the hidden part of the web is even more dangerous?

Cyber Threat Summit 2015 – Study on criminal activities in the dark web.  “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]

Pierluigi Paganini October 09, 2015
Code Signing certificates becoming popular cybercrime commodity

Learn what Certificates as a Service stand for, discover why Code Signing certificates are a precious commodity and find out how to protect yourself online. A recent phenomenon tracked by IBM Security X-Force researchers is the CaaS (Certificates as a service). Cybercriminals would use the Dark Web for selling high-grade code certificates -which they have […]

Pierluigi Paganini October 09, 2015
Kemoge – Malicious Android Adware Infects Devices worldwide

Researchers at FireEye spotted a new malicious adware campaign (Kemoge threat) that has infected Android mobile devices in more than 20 countries. Security researchers at Fireeye have uncovered a malicious adware campaign which relies on a threat dubbed “Kemoge” based on the name of its command and control (C&C) domain aps.kemoge.net. The Kemoge malware is packaged with various popular […]

Pierluigi Paganini October 06, 2015
Attackers hack into Outlook Web App (OWA) Server for access to organization network

Researchers have discovered an advanced malware that can breach organizations by infecting their Outlook Web Application (OWA) mail server. According to the experts at the Cybereason security firm threat actors breached an unnamed organization network and maintained persistence for months via a webmail server. The victim was a midsize public services company based in the […]

Pierluigi Paganini October 05, 2015
YiSpecter iOS Malware can infect any Apple iOS device

Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken and non-jailbroken devices. The recent XCodeGhost attack suffered by Apple demonstrated that nobody is completely secure from malware-based attacks. Now security researchers at PaloAlto Networks have discovered a new malware dubbed YiSpecter that they sustain is able to […]

Pierluigi Paganini October 04, 2015
Bogus PayPal App used to spread a banking Trojan

Security experts at Trend Micro have uncovered a spam campaign spreading a bogus PayPal app to steal German users’ banking credentials. A spam campaign is targeting German Andoird users, the malicious emails impersonate PayPal trying to trick the recipient into downloading a bogus PayPal app update that hides a banking Trojan. “Mobile banking is now used by […]

Pierluigi Paganini October 02, 2015
The Dridex Banking Malware is risen, British attention

The Dridex Banking Malware is risen, security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. Once against the Dridex banking Trojan is in the headlines, this week security experts at Palo Alto intelligence discovered a still ongoing large phishing campaign. The phishing campaign is targeting victims mainly in the UK, the malicious messages […]

Pierluigi Paganini October 02, 2015
The mystery behind the Internet-of-Things vigilante malware

A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT devices across the […]

Pierluigi Paganini October 01, 2015
New Apple Gatekeeper bypass can allow running rouge applications

Patrick Wardle, director of research at Synack has already demonstrated another method, called Apple dylib hijacking, to bypass Apple GateKeeper. Since the introduction of the Apple Gatekeeper by MAC OSX, many researchers have focused their attention in trying to find flaws affecting it due to bypass Apple security and gain control of a device. Patrick […]