-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: June 2015
Hacked Routers exploited to serve the Dyre banking trojan
Researchers at the Fujitsu Security Operations Center spotted a strain of Dyre being served exploiting hundreds of compromised home routers. According to the popular security expert Brian Krebs, criminals are exploiting a new technique to spread the Dyre banking malware, … Continue reading
Ransomware slinging exploit kit targets Flash remote code execution
Attackers have added a recent dangerous Adobe vulnerability to the Magnitude exploit kit, according to respected independent malware researcher “Kafeine”. The remote code execution vulnerability (CVE-2015-3113) revealed last week allows attackers to hijack un-patched machines targeting Internet Explorer on Windows … Continue reading
Client-Side Injected Malware en navegadoras
Client-Side Injected Malware (CSIM) incluye los widgets no autorizados, anuncios y spyware que se inyectan en sitios web por extensiones instalados en los navegadores, o por el malware descargado involuntariamente a las computadoras de los visitantes, tabletas y dispositivos móviles … Continue reading
Darknets in the Deep Web, the home of assassins and pedophiles
Security experts at Trend Micro published a report on the Deep Web and related illegal activities that exploit the darknets it contains. Experts at TrendMicro published an interesting report on the Deep Web focusing their analysis on the services and products available … Continue reading
Posted in Cyber Security, Vulnerabilidad
Tagged Deep Web, Dyre banking, Tor, Trojan, Vawtrak
Leave a comment
Dyre banking VXers LOVE Mondays, Symantec says
Nobody can accuse trojan coders of being lazy; the masterminds behind the Dyre banking malware are putting in full five-day working weeks to maintain some 285 command and control servers handling stolen banking credentials. The malware is one of the … Continue reading
US Businesses and Users Lost $18 Million to CryptoWall Ransomware
In a little over a year, the amount of money cashed in by operators of CryptoWall ransomware from victims in the United States got closer to the $20 / €17.8 million mark, according to the latest report from the FBI’s … Continue reading
Redmond: IE Win 8.1 defence destroying hack ain’t worth patch, natch
HP security research bod Dustin Childs says the company couldn’t get Microsoft to patch an IE exploit, so it’s gone public. Childs says the Address Space Layout Randomisation (ASLR) hole affects millions of 32bit systems and should have been patched. … Continue reading
Phishing gone: eBay patches to block session-jacking Magento holes
Vulnerability Lab researcher Hadji Samir says eBay has squashed three vulnerabilities in its Magento shopping platform that could permit session hijacking and man-in-the-middle attacks. The penetration tester disclosed this month the vulnerabilities along with proof-of-concept videosshowing how attackers could steal … Continue reading
SAP HANA Databases Vulnerable to XSS and SQL Injections
Speaking at the Black Hat Sessions conference in Ede, Netherlands, Dmitry Chastukhin, Director of Professional Services for ERPScan, has presented a report in which he details various problems with SAP’s encryption algorithms and static keys. These issues affect the SAP … Continue reading
How to hack into an email account, just by knowing your victim’s mobile number
Symantec has issued a warning about what appears to be a successful scam being perpetrated against users of webmail services such as Gmail, Outlook and Yahoo. The scam is explained in the following short videomade by Symantec. (I say it’s … Continue reading