Security Affairs

Pierluigi Paganini April 17, 2017
Terror EK rising in the threat landscape while Sundown EK drops

The Sundown EK has been inactive since early this year, the Terror EK is being very popular in the cybercriminal ecosystem. One year ago the Angler EK and Nuclear EK disappeared from the threat landscape, while the Sundown EK was conquering the criminal underground. What’s happening now? The Sundown EK has been inactive since early this year, the […]

Pierluigi Paganini April 16, 2017
Security Affairs newsletter Round 107 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html ·      Millions of mobile phones and laptops potentially exposed to attack leveraging baseband zero-days ·      ATMitch – […]

Pierluigi Paganini April 15, 2017
Microsoft says it has fixed exploits leaked by Shadow Brokers in March

Microsoft determined that most of the flaws exploited by the tools in the dump released by Shadow Brokers yesterday were patched in March. Yesterday the Shadow Brokers hacker group has released a new portion of the alleged archive of the NSA containing hacking tools and exploits. The group released a 117.9 MB encrypted dump containing […]

Pierluigi Paganini April 13, 2017
Hackers can steal PINs and Passwords capturing data from smartphone sensors

A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile devices are full of sensors (i.e. GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC) that could be exploited by hackers to gather data about owner’s activities? A group of researchers from Newcastle University demonstrated that […]

Pierluigi Paganini April 12, 2017
Watch out! Shadow Brokers dump includes remote root exploits for Solaris boxes

The security expert Matthew Hickey has discovered two tools dubbed EXTREMEPARR and EBBISLAND which were specifically designed to target Solaris systems. After the mysterious Shadow Brokers group has leaked the archive containing the stolen NSA hacking tools and exploits, security experts started analyzing the huge trove of data. Experts discovered that NSA operators developed an attack […]

Pierluigi Paganini April 09, 2017
Security Affairs newsletter Round 106 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html ·      Android Chrysaor spyware went undetected for years ·      UEFI Vulnerabilities allow to fully compromise Gigabyte Mini […]

Pierluigi Paganini April 03, 2017
Cyber Risk and Cyber Insurance – Insurance challenge to the CIO as corporate Cyber Security Effectiveness manager

[By Cesare Burei, Margas on courtesy of @CLUSIT – Rapporto Clusit 2017 – All right reserved] Until the corporate Risk Managers dealing with Cyber Risk, and there are not many of these, start working at all levels, who shall be entrusted with the management of Cyber Risks and, more specifically, with the transfer of risk […]

Pierluigi Paganini April 02, 2017
95,000 job seekers affected by the McDonald’s Canada data breach

The McDonald’s Canada career website was recently subject to a cyber-attack. Hackers stole records of 95,000 job seekers. McDonald’s Canada confirmed that hackers have stolen the personal data of about 95,000 job seekers from its recruitment website. The data were provided by candidates searching for a job at McDonald’s Canada since March 2014. The company […]

Pierluigi Paganini March 31, 2017
Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photo

Users can unlock Samsung Galaxy S8 phone by holding their Samsung Galaxy S8 in front of their eyes or their face … or their image. It looks like a film already seen, an IT giant presents a new product and hackers defeat its security measures. This time we are speaking of the Samsung Galaxy S8 and […]

Pierluigi Paganini March 28, 2017
Shamoon 2 – Palo Alto Networks sheds lights on the method for network distribution

Security researchers at Palo Alto Networks have determined that the Shamoon 2 malware uses a rudimentary technique for network distribution. Security researchers at Palo Alto Networks continue to analyze the dreaded Shamoon 2 malware and the recent waves of attacks, now they have determined that the threat uses a rudimentary technique for network distribution. The Shamoon 2 malware […]