CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication

| | General Security
A few days ago, security experts from IBM X-Force spotted a new strain of malware, tracked under the name CamuBot and targeting Brazilian bank customers. The malicious code immediately caught the... Go on to the site to read the full article ... Read More

CVE-2018-11776 RCE Flaw in Apache Struts Could Be Root Cause of Clamorous Hacks

| | Hacking
CVE-2018-11776 RCE in Apache Struts At the end of August, maintainers of Apache Struts released security updates for the Apache Struts 2 open-source development framework to address a critical remote... Go on to the site to read the full article ... Read More

WireLurker, Masque: Every Apple iOS App Could Be Compromised

Wrong conviction and bad habits Before the introduction of the Masque vulnerability and related attacks, I desire to contextualize my analysis. The security community is assisting with the rapid rise... Go on to the site to read the full article ... Read More

“Quiet Skies” – A TSA Surveillance Program Targets Ordinary U.S. Citizens

Here we are once more to discuss another surveillance program that could threaten the privacy of U.S. citizens. This time, our topic is the previously-undisclosed “Quiet Skies” program.... Go on to the site to read the full article ... Read More

Leaders’ Meetings: A Privileged Target for Hackers

| | Hacking
Leaders’ meetings are privileged targets for nation-state attackers that launch massive offensives to gather intelligence from the ongoing events. Let’s analyze together what has happened... Go on to the site to read the full article ... Read More
How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How much does a data breach cost? It isn’t a simple question, but the answer is the only way to transmit the urgency of the situation to C-level executives. The 2018 Cost of a Data Breach... Go on to the site to read the full article ... Read More
The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case

The Gaming Industry, a Privileged Target for Crooks — The Fortnite Case

| | Hacking
Introduction In the past, we’ve reported many cases of cyberattacks against companies operating in the gaming industry. We observed many attacks, especially DDoSing, against the infrastructure... Go on to the site to read the full article ... Read More
Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns

Five Techniques to Bypass Office 365 Protections Used in Real Phishing Campaigns

| | Phishing
In the last couple of years, crooks devised several techniques to bypass anti-phishing filters, let’s analyze them to understand the way threat actors used them to bypass Office 365... Go on to the site to read the full article ... Read More
Mirai botnet evolution since its source code is available online

Mirai botnet evolution since its source code is available online

Mirai – The evolving IoT threat Since the release of the source code of the Mirai botnet, crooks have improved their own versions by implementing new functionalities and by adding new exploits. A... Go on to the site to read the full article ... Read More

The VPNFilter: A Powerful Botnet of More Than 500k Devices Ready to Attack

VPNFilter botnet – The discovery Security researchers at Talos group, along with colleagues from other cybersecurity firms and law enforcement agencies, have discovered a huge botnet composed... Go on to the site to read the full article ... Read More
Loading...