cyber espionage

Pierluigi Paganini February 10, 2014
Snowden has leaked secret documents with a common web crawler

According an internal investigation Snowden has leaked the secret NSA’documents using a web crawler software designed to search, index and backup a website. The last assumption of the Snowden case is related to the way the whistleblower has collected the huge quantity of secret document from the National Security Agency (NSA). The leaked documents have shown […]

Pierluigi Paganini February 09, 2014
Cost of conducting APT campaigns is dramatically dropping

Speaking at Kaspersky Lab’s Industry Analyst Summit Costin Raiu, revealed that the cost for APT campaign is dramatically dropping. The cost of developing advanced malware has fallen dramatically malicious code like Stuxnet and Flame are today economically more affordable. It has been estimated that the expense for the development of a cyber weapon like Stuxnet,or for a […]

Pierluigi Paganini February 07, 2014
Disconcerting Report on cybersecurity for US Government entities

A report issued by The Federal Government’s Track Record provides a scaring picture on cybersecurity for US Government entities. The US Government is a privileged target for cybercriminals, state-sponsored hackers and hacktivists, for years now, officials and politicians have warned of the risks related to a cyber attack. Leon Panetta, former Director of the Central […]

Pierluigi Paganini February 05, 2014
US Intelligence warns on Counterintelligence and cyber espionage

Intelligence officials now view the threat from counterintelligence, foreign spying and the leaking, as the No. 2 danger facing the country. Top U.S. Intelligence officials released a new Worldwide Threat Assessment Report during a Senate hearing last week, they highlighted the top risks to national security. Let’s give a look to the list, cybersecurity  is still perceived […]

Pierluigi Paganini February 04, 2014
Fixed a serious flaw in Adobe Flash Player exploited in “the Mask APT”

Adobe has released security updates for Adobe Flash Player to fix a critical vulnerability exploited in a sophisticated cyber espionage campaign. Adobe has released today a new patch for the Flash Player product to fix a vulnerability which is currently being exploited. The vulnerability (CVE-2014-0497), allows an attacker to remotely take control of the targeted system […]

Pierluigi Paganini January 31, 2014
Lack of auth in 3G/4G USB modems exposes control panels to hackers

Andreas Lindh has discovered serious vulnerabilities in an unknown number of 3G/4G USB modems that can be exploited by attackers for spear phishing attacks.  The researcher Andreas Lindh has discovered serious vulnerabilities in an unknown number of 3G and 4G USB modems that can be exploited by attackers to steal user’s credential. The expert has found a Cross Site […]

Pierluigi Paganini January 27, 2014
Israeli Defense computer hacked via spear phishing attack

Aviv Raff, CTO at Seculert, confirmed that the attackers have penetrated into the network of Israeli Defense accessing to 15 computers. Israeli Defense is another illustrious victim of spear phishing attack, just on Friday Microsoft suffered a similar attack and attackers breached the email accounts of its staff accessing to documents on law enforcement inquiries. Reuters agency […]

Pierluigi Paganini January 24, 2014
Google Chrome bug allows sites to listen users private conversations

Web developers Tal Ater discovered a Google Chrome Bug that allows websites to listen to user private conversations. Google still hasn’t patched it! Google Chrome is one of the most diffused browsers, it has an excellent reputation in terms of security, usability and performance but it is wrong to consider it as perfect. As any […]

Pierluigi Paganini January 23, 2014
Who is spying on Tor network exit nodes from Russia?

Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results of a four-month study  conducted to test Tor network exit nodes for sneaky behavior, it has been discovered that a not specified Russian […]

Pierluigi Paganini January 21, 2014
SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape, the document is the result of a research conducted over the last three months correlating events across devices […]