Smishing Triad: China-Based Fraud Network Exposed

Resecurity explained the “Smishing Triad” campaign exclusively utilizes iMessages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Smishing Triad: China-Based Fraud Network Exposed

Esteemed Cybersecurity PR Agency Turns 28

Today, award-winning cybersecurity PR agency, Eskenzi PR, turns 28. The agency, founded in 1995 by Yvonne Eskenzi and Neil Stinchcombe, has worked with some of the largest names in the cybersecurity industry and helped many organisations through sales, acquisitions and…

GhostSec: Hacktivist Breach Iranian Surveillance Software

Hacking group GhostSec confirmed that they have taken down Fanap Behnama – Iran’s privacy-invading software – and also mentioned details of its surveillance capabilities.  Apparently, GhostSec exposed 20GB of data that involved source code relating to face recognition and motion…

Flight Data Issues Trigger UK Air Traffic Control Failure

  A significant air traffic control malfunction resulted in extensive flight disruptions, leaving numerous passengers stranded both domestically and internationally. The root cause of this disruption was attributed to issues with the reception of flight data. Martin Rolfe, the CEO…

Open-Source Malware SapphireStealer Expands

Cisco Talos said SapphireStealer has evolved significantly, resulting in multiple variants This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Open-Source Malware SapphireStealer Expands

New Study Reveals Airbnb as a Haven for Cybercrime

  Cybercriminals have been increasingly using the Airbnb network for illicit activities. A new research by cybersecurity experts at SlashNext uncovered the methods employed by these malicious actors to hack user accounts and benefit from stolen data.  Due to its…

How To Check Office Files for Macros Using Java

The Microsoft OpenXML files we use on a day-to-day basis are conveniently designed to be accessed and manipulated programmatically. We can jump into any OpenXML file structure in a variety of capacities (usually via specialized programming libraries or APIs) to…

UNRAVELING EternalBlue: inside the WannaCry’s enabler

WannaCry and NotPetya, probably two most damaging cyberattacks in recent history, were both only made possible because of EternalBlue. Here is how the NSA-developed cyber monster works, and how you should defend against it. What is the EternalBlue vulnerability? EternalBlue…