Security experts discovered a security vulnerability in the Facebook Messenger App that allows hackers to replace the content of the messages they send. Security experts from Check Point early this week reported a serious vulnerability in the Facebook Messanger App that could be exploited by attackers to replace the content of the messages they send […]
The anti-phishing company PhishMe that observed that as of the end of March 93 percent of all phishing emails contained a ransomware. Ransomware is becoming a privileged instrument of cyber criminals to rapidly earn money, the diffusion of this type of threat is changing the threat landscape scenario, for example, as of the end of March, […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hacking NTP Servers from Long-Distance with low cost devices Why surveillance firm Blue Coat was granted a powerful encryption certificate? Security Affairs newsletter Round 62 – News of the week Highly targeted ransomware campaign hit Swedish Telia […]
The researchers from the Trustwave’s Spiderlabs team discovered that a Windows zero-day is available for sale in a popular crime forum for $90,000. A Windows zero-day flaw was offered for sale at US$90,000 on the Russian crime forum exploit.in. The flaw could be exploited by hackers to gain a full deep access to an already compromised […]
Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for web monitoring. Once again we are here speaking about surveillance, security experts have discovered that the controversial firm Blue Coat Systems was granted powerful encryption digital certificates. Blue Coat sells web-monitoring software, its surveillance appliances were […]
Today I propose you an interview with Sneaker, one of the members of the GhostSec crew. The Sneaker is a very intriguing expert involved in counterterrorism operations against the ISIL members online. Ghost Security (GhostSec) is an internationally-based counterterrorism group that specializes in intel collection, threat analysis and digital weapons. Its cyber operations consist of collecting actionable […]
According to security experts at Check Point the creators of the Nuclear EK are gaining nearly 100K USD each month, most victims are in Europe and US. Most people interested working with a cloud business model nowadays, even malware programmers. It is better than just one time selling a security exploit, authors of malware are […]
A data breach suffered by LinkedIn back in 2012 is still haunting the security community. In 2012, LinkedIn suffered an attack heard around the professional world. The social networking site that caters to professionals and their social peer groups suffered and breach of nearly 6.5 million users. The attack was attributed to Russian hackers who […]
What is a SOC? What is its mission? Which are the Security tools and technology components of a SOC? Here come all the answers. A definition What is a SOC? A Security Operations Center (SOC) is an organized and highly skilled team whose mission is to continuously monitor and improve an organization’s security posture while […]
Researchers at the Microsoft’s Malware Protection Center are warning of a new wave of attacks leveraging malicious macros using a new sneaky trick. Researchers at Microsoft’s Malware Protection Center are warning of a new technique attackers are using to allow macro malware elude detection solutions. The experts first spotted the technique while analyzing a file […]