zero-Day

Pierluigi Paganini July 24, 2015
ZDI disclosed 4 zero-day vulnerabilities in Internet Explorer

The HP Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers to remotely execute code. The HP’s Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers to remotely execute code. The four zero-day flaws affect different components of the browser […]

Pierluigi Paganini July 20, 2015
Phishing campaigns target US government agencies exploiting Hacking Team flaw CVE-2015-5119

A recent FBI memo warns phishing attacks targeted government agencies trying to exploit the CVE-2015-5119 vulnerability linked to Hacking Team data breach. According to an FBI warning, hackers have targeted US Government agencies using a recently patched Adobe Flash vulnerability (CVE-2015-5119). The Adobe Flash vulnerability was one of the flaws discovered by analyzing the 400Gb archive […]

Pierluigi Paganini July 14, 2015
Hacking Team, the third Flash Zero-Day is out: CVE-2015-5123

Following the Hacking Team data breach, the security researchers discovered the third Adobe Flash Player zero-day vulnerability. A third Adobe Flash Player zero-day has been discovered since the HackingTeam breach. Thanks to the breach of the Hacking Team‘s private files, the third Adobe Flash zero-day has been made publicly accessible. “After two Adobe Flash player zero-days disclosed […]

Pierluigi Paganini July 12, 2015
Hacking Team Another Flash Zero-Day: CVE-2015-5122

Following the Hacking Team data breach, yet another Adobe Flash Player zero-day vulnerability has been found actively exploited in-the-wild. Another Flash Zero-Day: CVE-2015-5122 Yet another Adobe Flash Player zero-day has been found actively exploited in-the-wild. Thanks to the breach of the HackingTeam’s private files, another Adobe Flash zero-day has been made publicly accessible and hackers […]

Pierluigi Paganini July 12, 2015
A new Zero-Day Vulnerability arises from Hacking Team hack

Security Researchers at Trend Micro have discovered a second Zero-Day Vulnerability that arises from Hacking Team cyber attack. Just Three days ago, Adobe released a new version of Flash to patch the zero-day vulnerability that was disclosed as part of the Hacking Team hack. Security experts at Trend Micro confirmed that the Adobe Flash vulnerability […]

Pierluigi Paganini July 11, 2015
Wekby APT attacks leverage Hacking Team exploits

According to the experts at Volexity the Flash Player exploit has been leveraged in spear phishing campaign launched by the Wekby APT. As anticipated, several criminal gangs included the code for the exploitation of CVE-2015-5119 vulnerability in their exploit kits, let’s remember that the exploits code was disclosed as the result of the attack against the Hacking […]

Pierluigi Paganini July 09, 2015
Hacking Team Zero-Day tied to attacks In Korea and Japan

Security experts at Trend Micro revealed that one of the exploits discovered in the Hacking Team package tied to Attacks In Korea and Japan. Following the recent hack of the popular surveillance firm Hacking Team, the experts started the analysis of the material leaked online by the attackers. The package leaked online include also a number […]

Pierluigi Paganini July 08, 2015
Hacking Team Flash Zero-Day exploits are being used in the wild

Security experts confirmed that Adobe Flash vulnerability revealed in the recent attack against the Hacking Team is being used in the wild. Every IT security website is publishing information related to the recent hack of the Hacking Team and consequent exfiltration of more than 400 GB of sensitive data. The most scaring scenario is already […]

Pierluigi Paganini July 07, 2015
Adobe Zero-Day Exploits leaked in Hacking Team hack

Researchers discovered several exploits in the data stolen from the Hacking Team, including ones for zero-day vulnerabilities. The recent hack of the Hacking Team firm has caused the exposure of 400GB of corporate data which includes source code (GitHub repository), emails and other sensitive documents belonging to the surveillance software firm. According to security experts at Trend Micro, the […]

Pierluigi Paganini June 17, 2015
Understanding Malware Terminology for Beginners

A brief introduction to several malware-related terms in an easy-to-understand manner. A useful glossary to better understand the “malware” terminology. Introduction The world that we live in is constantly changing; it is always evolving. The sophistication of the technology at the disposal of both those who “wear” a white hat (the good guys) and those who wear a black hat (the bad guys) […]