Marco Túlio De Moraes

251 Flips | 5 Magazines | 16 Followers | @marcotuliom1hi4 | Keep up with Marco Túlio De Moraes on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Marco Túlio De Moraes”

XSS flaw found in the Google's PHP API enables phishing attacks

Security researchers have discovered a bug in Google's PHP client library for accessing Google APIs that could enable criminals to take advantage of …

Russian code used in Iranian campaign

Attacks believed to be Iranian in origin were fended off for more than two weeks in April, but security experts examining the code detected something …

Cybersecurity

DocuSign's stolen emails lead to phishing attacks

Threat actors are using stolen DocuSign customer emails in a phishing campaign to spread malicious Word Documents.<p>DocuSign said in a May 15 …

Phishing

1.9 mil Bell Customer Email Addresses stolen

Bell is one of the leading Telecom companies in the world at the moment and has been holding a reputation for itself. However, a recent breach to its …

Customers

Google Shuts Down Docs Phishing Spree

Google has removed offending accounts involved in a widespread phishing attack today impersonating Google Docs.

Google Docs

Chipotle warns customers about data breach

Fast food chain Chipotle warned customers on its website on Tuesday that the company experienced a data breach.<p>"We want to make our customers aware …

Cybersecurity

Data breach of U.S. auto lender left over 500K customers exposed

A data breach at a California-based auto lending company left exposed the personal information of at least half a million customers—and potentially …

AFP data breach: six cases of alleged police misconduct investigated

Four of the matters were deemed by the AFP to be ‘not established’, and two were ruled as not requiring further investigation<p>The Australian federal police conducted six internal investigations in the past 18 months into alleged professional misconduct of officers who had been newly approved to …

Sabre Corp. Investigating Breach of Reservation System

Travel services company Sabre Corp., acknowledged this week that it’s in the middle of investigating a data breach in its Hospitality Solutions …

Hospitality

Google Email Attacked recently by Hackers

Google told the media that they were investigating an event where their email servers got hacked for a certain period of time. They claimed that the …

Google Drive

Data breaches cost US businesses an average of $7 million — here’s the breakdown

This post is sponsored by Dell Technologies and Intel® - partners in hardware-enabled security solutions. Intel Inside®. Powerful Productivity Outside. Learn more at delltechnologies.com.<p>The impact of cyber threats is rising in the US, with the average cost of a data breach now over $7 million …

Visa Threat Intelligence | Visa>

F-Secure Acquires Jonathan Zdziarski's Mac Security App 'Little Flocker'

Cyber security company F-Secure has acquired Little Flocker, the behavioral analysis-based monitoring app for Macs, developed by iPhone forensics expert and security researcher Jonathan Zdziarski, who joined Apple last month.<p>The Helsinki-based firm announced the news in a press release posted to …

This Massive VPN Comparison Spreadsheet Helps You Choose the Best for You

Choosing a trustworthy, reliable VPN service provider is hard, but over on Reddit, user That One Privacy Guy collected virtually everything there is …

GR Pick: Chevy Volt Hacked to Play Mario Kart 64

Those who know how to successfully hack will attempt to do so on just about anything. This past year, one hacker with a love for retro video games …

10 Must Read Infosec Books

I was recently asked to participate in selecting one information security book to add to a round-up of recommended reading for infosec pros. The …

Infosec

AntiVirus Evasion Reconstructed – Veil 3.0

The Veil Framework is a collection of tools designed for use during offensive security testing. When the time calls for it, Mandiant’s Red Team will …

Forensics

New Fileless Malware Uses DNS Queries To Receive PowerShell Commands

It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of …

Ransomware picks off broader targets with greater severity

If you thought it was bad when the FBI reported last year that ransomware was on the rise, you should read the forecasts for this year. According to …

AntiVirus Evasion Reconstructed - Veil 3.0

This is the talk given at NullCon 2017. This talk give s history of the Veil Framework, and showcases the differences between 2.0 and the newly released 3.0. Veil 3.0 is released in this talk

Survey explores the minds of hackers: 81% claim they can compromise target in under 12 hours

Eighty-eight percent of hackers surveyed at the 2016 DEF CON conference in Las Vegas last August claimed that they can compromise a target in less …

Cybersecurity

9 Popular Password Manager Apps Found Leaking Your Secrets

Is anything safe? It's 2017, and the likely answer is NO. Making sure your passwords are secure is one of the first line of defense – for your …

Hacking

Paper factory fired its sysadmin. He returned via VPN and caused $1m in damage. Now jailed

34-month sentence and he has to pay his old bosses backA sacked system administrator has been jailed after hacking the control systems of his …

Baton Rouge

Blue Team Training Toolkit v2.1 has been released!

Mocksum – New Module<p>This version includes Mocksum, a new module that provides access to mock files. In a nutshell, these are harmless files that …

With Security Metrics, Every Picture Tells a Story

Using Security Metrics to Drive ActionTenable recently sponsored the publication of an ebook, Using Security Metrics to Drive Action. This ebook is a …

Skype

Dissecting Domain Generation Algorithms

Adversaries are increasingly turning to domain generation algorithms to remotely communicate with the sophisticated, malicious tools they create.

Hackers impersonate CEOs and CFOs most often during phishing attack

All it takes is one of three words and impersonating the correct executive to pull off a successful Business Email Compromise (BEC) attack, according …

Prove It: The Rapid Rise of 12,000 Shared Proof-of-Concept Exploits

IntroductionSecurity researchers, threat actors, academics, and industry professionals all code proof-of-concept (POC) exploits.These POCs are …

Information Security

Google releases study on infected websites; more than 760K sites compromised annually - Threat Brief

Google researchers partnered with a research team from the University of California, Berkeley to analyze the infection and potential remediation of …

Bank with No Firewall. That's How Hackers Managed to Steal $80 Million

In Brief<p>Investigators from the Forensic Training Institute of the Bangladesh investigated the $80 Million bank heist and discovered that the hackers …