At least three White House employees personal Gmail accounts hacked by the popular group of hackers knows as Syrian Electronic Army (SEA). White House employees personal email hacked, it is happened to three staffers that suffered data breaches on their personal Gmail accounts. The source of intelligence revealed a link between this attack and the […]
Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted attack has been uncovered by Trend Micro security experts, the hackers hit European government agencies trying to steal login credentials from Internet Explorer (IE) and Microsoft Outlook. The attackers trying to […]
A critical Facebook flaw exposed email address for any account, the discovery was made by Stephen Sclafani, security researcher and founder of PlayToWin. Another vulnerability menaces privacy of Facebook users allowing the disclosure of primary email address of any account. Stephen Sclafani, security researcher and founder of PlayToWin, described the attack technique in a blog post titled […]
Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military secrets. The hackers behind the recent attacks against South Korean infrastructure are professionals that designed also malicious code to steal military secrets to the South Korea and US military. Security experts at McAfee Labs revealed […]
The ICS-CERT issued a new Monitor report that revealed a surge of brute force attacks against control systems mainly belonging to the energy sector. The ICS-CERT issued a new Monitor report that revealed an intensification for brute force attacks against control systems mainly belonging to the energy sector. The ICS-CERT received notification for more than 200 […]
The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals… The number of cyber attacks against energy sector is increased creating great concerns within the security community. Oil and gas firms are subject to continuous offensives moved by hacktivists and state-sponsored attacks, their activities are crucial for any country and due this reason are considered privileged targets. […]
Network security engineer âRicheeâ explained how to use a Raspberry Pi to realize a physical backdoor to gain remote access to an office network. Network security engineer âRicheeâ published an interesting post on how to use a tiny Raspberry Pi computer to obtain physical access into a corporate network. I decided to publish this post because […]
Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as the work of a single company is truly an understatement. Palantir Technologies, this is the most popular company name referred when discussing those who have supported the U.S. Government in the development of massive surveillance […]
NetTraveler cyber espionage campaign, revealed by Kaspersky’s team, targeted over 350 high profile victims from 40 countries. NetTraveler, this is the name of a new global cyber espionage campaign revealed  by researchers at Kaspersky, the team of experts discovered an espionage activity against over 350 high profile victims from 40 countries. The name of the operation derives […]
Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised Indian gov Web site leads to BlackHole Watering Hole attacks increase in a meaningful way in the last years following a scaring trend, the technique is based on infection of websiteâs visitors, typically attackers use to […]