phishing

Pierluigi Paganini April 10, 2015
Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in today’s world is the task of securing their organization’s assets.  While physical security is a huge component in ensuring that the residual risk level existing […]

Pierluigi Paganini April 09, 2015
AlienSpy RAT exploited to deliver the popular Citadel Trojan

Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]

Pierluigi Paganini April 08, 2015
How Russians hackers breached the White House unclassified network

According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]

Pierluigi Paganini April 06, 2015
Another phishing scam is targeting Yahoo users

A new phishing scam is targeting Yahoo users worldwide, this campaign could be ineffective if we share awareness about bad actors’ TTPs. A new large-scale scam is trying to deceive Yahoo users that are receiving a phishing email that asks for “Yahoo Account Confirmation.” The phishing email claims to be sent by Yahoo, it requests […]

Pierluigi Paganini March 29, 2015
British Airways Executive Club members accounts compromised

British Airways Executive Club member accounts were hacked, it isn’t a data breach but hackers used credentials available in the underground. The popular security expert Graham Cluley reported that Members of British Airways Executive Club are noticing suspicious activities for their accounts. The Members of British Airways Executive Club observed that their accounts were mysteriously emptied of […]

Pierluigi Paganini March 13, 2015
A new Facebook Worm exploits multiple cloud services

Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social media are a privileged attack vector, recent reports published by the principal security firms confirm that cyber criminal are exploiting these platforms for illegal activities. Last disastrous news for the users of the popular social […]

Pierluigi Paganini March 13, 2015
Google privacy breach caused by a software defect

Expert at Cisco discovered a privacy breach caused by a software problem, which exposed personal information of users that opted for privacy setting. A software problem occurred at Google have exposed personal information of users that registered their website and had chosen to keep their profile private. The flaw affected the whois database that contains contact […]

Pierluigi Paganini March 09, 2015
Hackers Abuse Google Apps flaw to run phishing campaigns

A critical flaw affecting Google Apps for Work allows hackers to run malicious phishing campaigns by abusing any website’s domain name. A critical vulnerability affecting Google Apps for Work allows attackers to send phishing emails. The vulnerability in Google Apps for Work could be exploited to send emails by abusing any website’s domain name and run phishing campaign on the […]

Pierluigi Paganini February 19, 2015
Arid Viper – Israel entities targeted by malware packaged with sex video

Attackers behind the Arid Viper and the Yanbian Gang exploited sex  content for their campaigns against victims in Israel and Kuwait, and South Korea. Security experts at Trend Micro have uncovered a cyber espionage campaign, dubbed Operation Arid Viper, that targeted Israeli institutions. The Operation Arid Viper is run by Arab-speaking hackers that sought to extract […]

Pierluigi Paganini February 17, 2015
How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high level of awareness of the threat, the phenomenon does not slow down, indeed seems to accelerate […]