Soluzioni per l'analisi della Sicurezza Informatica
  • ISGroup Independent Research [EN]
  • ISGroup Partner per la sicurezza [IT]
  • September 5, 2013

    Hesperbot: A New, Advanced Banking Trojan in the Wild

    Hesperbot – A New, Advanced Banking Trojan in the Wild: Analysis of the threat revealed that we were dealing with a banking trojan, with similar functionality and identical goals to the infamous Zeus and SpyEye, but significant implementation differences indicated that this is a new malware family, not a variant of a previously known trojan. […]

  • September 5, 2013

    Persistent adversaries can identify Tor users

    Persistent adversaries can identify Tor users: “Our analysis shows that 80% of all types of users may be de-anonymized by a relatively moderate Tor-relay adversary within six months. Our results also show that against a single AS adversary roughly 100% of users in some common locations are de-anonymized within three months (95% in three months […]

  • September 5, 2013

    IT Security Industry To Expand Tenfold

    IT Security Industry To Expand Tenfold: Spending on IT security is poised to grow tenfold in ten years. Every organization from the largest oil and gas refiner, to the smallest bank has underspent on security. Classic risk management methodologies call for trade-offs in security. Unlikely events, Black Swans, are not accounted for. This protect-against-the-known philosophy […]

  • September 4, 2013

    Gumdrop.exe, quick Windows Recon

    Gumdrop.exe, quick Windows Recon: Gumdrop.exe was created to quickly gather useful information about a Windows host.  This tool can be leveraged offensively or defensively during a Cyber competition to learn more about the host.

  • September 4, 2013

    FTC files complaint against LabMD after investigating its security practices

    FTC files complaint against LabMD after investigating its security practices: After a legal back-and-forth to investigate a major breach, the Federal Trade Commission (FTC) has filed a complaint against an Atlanta-based medical testing lab accused of exposing the data of more than 9,000 consumers. In the complaint filed on Thursday in a Washington, D.C. federal administrative […]

  • September 4, 2013

    Annual Incident Reports 2012

    Annual Incident Reports 2012: This report provides an overview of the process and an aggregated analysis of the 79 incident reports of severe outages of electronic communication networks or services which were reported by national regulators during 2012.

  • September 4, 2013

    NSA Laughs at PCs, Prefers Hacking Routers and Switches

    NSA Laughs at PCs, Prefers Hacking Routers and Switches: The NSA runs a massive, full-time hacking operation targeting foreign systems, the latest leaks from Edward Snowden show. But unlike conventional cybercriminals, the agency is less interested in hacking PCs and Macs. Instead, America’s spooks have their eyes on the internet routers and switches that form […]

  • September 4, 2013

    Don’t run a Tor router and a hidden service from the same connection!

    Don’t run a Tor router and a hidden service from the same connection: Don’t run a router and a hidden service from the same connection if you want to remain anonymous.  While I hate to tell people not to contribute, if you’re running a hidden service it is a bad idea to run a router […]

  • September 3, 2013

    Oracle Java ByteComponentRaster.verify() Memory Corruption

    The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file.

  • September 2, 2013

    Kelihos P2P Botnet Leveraging Composite Blocking Lists

    Kelihos P2P Botnet Leveraging Composite Blocking Lists: Kelihos, the peer-to-peer botnet with nine lives, keeps popping up with new capabilities that enable it to sustain itself and make money for its keepers by pushing spam, harvesting credentials and even stealing Bitcoins. According to a number of sources, Kelihos is now leveraging legitimate and freely available security […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved