blog trackingRealtime Web Statistics Exploits | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘exploits’

New free tool detects Hacking Team exploits

Source: National Cyber Security – Produced By Gregory Evans

A security company has released a free tool to users who suspect they may be a victim of Hacking Team’s exploit cache. Hacking Team is a secretive Milan-based firm which specializes in the sale of surveillance tools, malware and exploits to governments, law enforcement and private firms worldwide. The firm hit the spotlight in recent times after becoming the victim of a cyberattack, in which a hacker walked away with over 400 gigabytes in stolen corporate data. The investigation is yet to reveal who is responsible for the data breach — although suspicions have turned toward the possibility of an insider job. Among leaked financial reports, customer lists and service presentations, emails detailing zero-day exploits and proof-of-concept examples are being analyzed as researchers dig through the firm’s stolen data. Software vendors are racing to patch previously unknown vulnerabilities in their systems. Adobe andMicrosoft, among others, have issued security patches to make Hacking Team’s exploits and tools obsolete. In the meantime, users are left to wonder if they have been infected with Hacking Team malware, of which some tools are so virulent they stay on a system even after hard disk wipes and removals. Researchers at Rook Security have decided to […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New free tool detects Hacking Team exploits appeared first on National Cyber Security.

View full post on National Cyber Security

Cyberspies love exploits from Hacking Team leak

Source: National Cyber Security – Produced By Gregory Evans

The leaked files from surveillance software maker Hacking Team have proven to be a great resource for cyberespionage groups, which have used at least two Flash Player exploits from the company’s arsenal. Last Tuesday, security researchers from security firm FireEye detected targeted attacks against organizations in Japan, with the attackers using an exploit for CVE-2015-5122, a Flash Player vulnerability patched by Adobe Systems that same day. The vulnerability was publicly known before that date because an exploit for it was found in the 400GB data cache recently leaked by a hacker from Milan-based Hacking Team. An unknown hacker broke into the computer network of Hacking Team, a company that sells computer surveillance software and intrusion tools to government agencies worldwide. The attacker released email communications, client lists, files, source code, documentation and previously unknown software exploits. The group of attackers that targeted the Japanese organizations did so through strategic Web compromises, also known as watering hole attacks. The tactic involves compromising websites that are typically visited by organizations from particular industries. Two websites compromised in this case belonged to Japan’s International Hospitality and Conference Service Association (IHCSA) and Cosmetech, a Japanese cosmetics company. Once victims visited those websites, malicious scripts […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyberspies love exploits from Hacking Team leak appeared first on National Cyber Security.

View full post on National Cyber Security

Former world’s most wanted hacker Kevin Mitnick now sells zero-day exploits

Former world’s most wanted hacker Kevin Mitnick now sells zero-day exploits



Kevin Mitnick, a famous (former) hacker who is now a security consultant, has ventured into a new business: buying and selling high-end zero-day exploits. Dubbed Absolute Zero Day Exploit Exchange, the six-month-old service sells exclusive unpatched exploits to corporate as […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Bitcoin Malware Attack Exploits Russia-Ukraine Crisis

Source: National Cyber Security – Produced By Gregory Evans

Bitcoin Malware Attack Exploits Russia-Ukraine Crisis



A hacker group is trying to leverage the ongoing conflict between Russia and Ukraine as it distributes malware that is capable of targeting bitcoin wallets. A report by Bitdefender Labs, a cybersecurity firm that focuses on the digital currency market, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Bitcoin Malware Attack Exploits Russia-Ukraine Crisis appeared first on National Cyber Security.

View full post on National Cyber Security

Snapchat exploits published by snubbed researchers

  After months of being ignored by the company behind the popular instant messaging app Snapchat, Australian hackers Gibson Security has finally published exploits that they discovered. The exploits could be used to match names and phone numbers on Snapchat. Additionally, unscrupulous hackers could also use the exploits to create thousands of fake Snapchat accounts en masse. […]

View full post on Gregory d. evans

CDI 2012 – SEC504 – Hacker Techniques, Exploits & Incident Handling

SANS is offering 1 course(s) at this training event being held in 201212 – SEC504, DC US starting on December 9, 2012. Please visit http://www.sans.org/event/29165 for complete information and to register for this event. View full post on SANS Institute – ALL Training Events

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Trend Micro ‘virtual shield’ protects against unpatched exploits

Trend Micro has broadened its cloud-based security infrastructure so that its products can receive actionable threat intelligence that lets the security software act like a “virtual shield” against many web-based threats. View full post on Techworld.com security

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Black Hat: Most Java malware exploits “type confusion” vulnerability

A researcher investigated Java exploits, and drew on one well-know example, to explain how one of the most common classes of attack spreads. View full post on Latest articles from SC Magazine News

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Cross-platform malware exploits Java to attack PCs and Macs

The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers.

View full post on malware – Yahoo! News Search Results

View full post on National Cyber Security » Virus/Malware/Worms

Page 1 of 3123»

My Twitter

Gregory D. Evans On Facebook