Domain Threat Intelligence – Digital tech it’s at the core of every industry nowadays. Automation and interconnection between machines are the pillars at the center of the current economic revolution, but at the same time this Paradigm shift and the subsequent expansion of the digital perimeter has increased several times the risk of Cyber Attacks.
The Cybersecurity and bug hunting team from the Italian firm Swascan has uncovered 5 vulnerabilities related to the servers of Microsoft’s IT infrastructure. Microsoft is the well-known American multinational technology company. Its best-known software products are the Microsoft Windows line of operating systems and the Microsoft Office suite. On top of that the Seattle based
Source code: what is it? Source code can be called source as well as code and it is the original version of a software. Basically, the way software has been written and typed into the laptop in the first place. That is the reason of its being in plain text. What do we mean when we refer to softwares?
Satori Satori is the name of a malware family. Maybe you heard the most famous Mirai of which Satori is a variation. It targets smart-tvs, IP-cams, routers,… Basically anything online. Its purpose is to turn these connected items into little and powerful botnet soldiers. Recently, a bunch of Chinese researchers found out that a modified version of Satori
Data breaches: the top 10 of last year We all know last year has been a struggling period for cybersecurity, just look at the incredible numbers of the ransomware phenomenon ( Petya as an example ). Hackers attacked a lot and a lot of data have been stolen. Attackers stole personal information, passwords,… anything valuable
Meltdown and Spectre It sounds like an IT apocalypse: Meltdown and Spectre. What is happening? Let’s try to see it clear. These vulnerabilities seem to be the a huge matter. It concerns each personal computer and device made in the last ten years. The weak spot is not about a software this time but seems
What about us? September is an important month for us. No doubt about that, and this is testified with our attendance to the most important European CyberSecurity conference: CyberTech Europe 2017. Come to visit us! Swascan will be in the Innovation Pavillon in CyberTech Europe 2017, and present the product to the most important cyber people of the
UniCredit hack: another challenge We know which is the target. This is fresh news. UniCredit hack represents the newest challenge to face. Immediately after the attack, there is not a lot of information available. What do we know? Attackers should not have any access to data that can move money. They don’t have any password
Petya Petya is the name of the new worldwide threat that hit a lot of organization all across Europe and US. It spread through several large firms. Here we have a few examples: the advertiser WPP, food company Mondelez, legal firm DLA Piper and Danish shipping and transport firm Maersk. This is not the first
Ransomware The WannaCry hack affected more than 300,000 computers in 150 countries last week (not talking about Petya). It has made the cyber security stocks to boom during this week – all for a ransomware! The attack started on Friday, May 12 and had fully spread by Monday, May 15. This has spurred companies’ interest in
Supply Chain Defending ourselves from informatics risks is not enough, the real challenge is protecting the whole supply chain The Digital Transformation, alongside the ever-growing use of mobile technologies, cloud services and Internet of Things (IoT), has brought about significant changes in security impacting every business process. This change implied a massive increase in Big