spear phishing

Discovered Open URL Redirection flaw in Facebook

Researcher Dan Melamed recently discovered an open url redirection flaw in Facebook that allowed to have a facebook.com link redirect…

12 years ago

LinkedIn – How to exploit social media for targeted attacks

  The professional social network LinkedIn is a mine of information for any king of attackers, a Websense post described…

12 years ago

Icefog – Kaspersky discovered the group of cyber mercenaries

Kaspersky Lab discovered the emerging group of cyber-mercenaries Icefog available for hire to perform surgical hit and run operations against…

12 years ago

NetTraveler APT hackers still active improved their attacks

Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack…

12 years ago

Poison Ivy still alive, old malware new cyber threats – FireEye report

Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools…

12 years ago

Critical Pinterest Exploit threatens the privacy of millions of users

Security researcher Dan Melamed has found a serious Pinterest Exploit that exposed user's information of over 70 Million accounts. The…

12 years ago

Uncovered an unusual attacks based on anomalous file infector

Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft…

13 years ago

Trend Micro – targeted attack against Europe-Asia government agencies

Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook…

13 years ago

Hackers hit South Korea also spread spyware to steal military secrets

Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military…

13 years ago

ICS-CERT Surge In attacks against Energy Industry

The ICS-CERT issued a new Monitor report that revealed a surge of brute force attacks against control systems mainly belonging…

13 years ago

This website uses cookies.