FireEye discovered that the Group of hackers dubbed APT3 that managed the Op Clandestine Fox is now running a new campaign dubbed Operation Double Tap. Researchers at FireEye have uncovered a new advanced persistent threat crew dubbed APT3, which is using exploits targeting recently disclosed vulnerabilities in Windows. The experts at FireEye believe that APT3 is the same […]
What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous? The recent shutdown of several black market places in the Tor network, including the popular SilkRoad 2.0, has captured the attention of media of the extension of illegal activities in the part of the web […]
State-sponsored hackers are suspected of breaching the systems of the United States Postal Service exposing the data of more than 800,000 employees. The U.S. Postal Service has suffered a major data breach that may have exposed the personal information of more than 800,000 employees, including data on customers who contacted Postal Service Customer Care Center […]
Trend Micro discovered a cyber-espionage operation dubbed Operation Pawn Storm, which is targeting military, government and media entities worldwide. A new cyber espionage operation targeting military, government and media agencies on a global scale has been discovered by security experts at Trend Micro. Also in this case it seems that the threat actors behind the operation, dubbed […]
Security experts at Google and McAfee have discovered a new Zero-day vulnerability in Microsoft OLE being exploited in targeted attacks. Early this week, Microsoft issued the security advisory 3010060 to warn its customer of a new Zero-Day vulnerability that affects all supported versions of Windows OS except, Windows Server 2003. The OLE Packager is the component that is affected by the zero-day, […]
De-Anonymize Google Users with new Timing Attack is possible, it is also possible identify Tor users if they’re logged in to Google while using Tor browser. De-anonymize Google users is the goal of different studies and a new research conducted by Andew Cantino, the vice president of engineering at Mavenlink, demonstrates that it is possible to […]
Experts at Clearsky detected the Gholee virus which was likely developed by highly qualified factors, which may even be related to Israel’s long-time nemesis Iran. Experts from Clearsky, an Israeli cyber-security company, detected an “operation protective edge” themed spear phishing attack, carried out via emails containing a malicious excel file. Once opened and its VBA […]
Nuclear Regulatory Commission systems were hacked three times in the last three years. According to investigators the bad actors are foreign hackers. U.S. Nuclear Regulatory Commission (NRC) has been hit by cyber attacks three times during the past three years, bad actors behind the offensives have conducted spear phishing attacks to compromise the internal network […]
CyberESI firm revealed that Chinese hackers members of the Comment Crew group violated the corporate networks of top Israeli defense companies. Once again a news refers of Chinese hackers, alleged members of the Comment Crew group, who have conducted a cyber espionage campaign. This time is has been reported that the attackers violated the databases of three […]
The ICS-CERT has issued a security advisory related to the existence of OpenSSL vulnerabilities affecting different Siemens industrial products. Several Siemens industrial products are affected by four vulnerabilities in their OpenSSL implementation which could be remotely exploited to run a man-in-the-middle (MitM) attack or to cause the crash of web servers of the products. Critical infrastructure […]