All posts by Paolo Passeri

An Additional Compilation of Attack Maps (Including a Tool to Build Your Own)

Finally let’s close this series of posts dedicated to the attack maps made available by security vendors (Part I and Part II) with an additional compilation of more useful resources (once again reported in rigorous alphabetical order).... Read More

It’s Still a World of Botnets and Cyber Attacks

Big data analysis has become a very powerful weapon in the hands of security companies: the ability to process in real time a huge amount of information collected by a global network of sensors allows to build predictive models (in contrast to traditional static signature/blacklist-based approaches) and to distribute the countermeasures at an unprecedented speed.... Read More

1-15 August 2015 Cyber Attacks Timeline

It’s time to publish the first timeline of August. ... Read More

July 2015 Cyber Attacks Statistics

It’s time to publish the statistics derived from the July Cyber Attacks Timelines (part I and part II).... Read More

Has The European Central Bank Really Been Hacked? Yes! One Year Ago!

Last week I stumbled upon several posts (which some keep on sharing) about a mysterious cyber attack against the European Central Bank, allegedly notified on July, the 24th, 2014. All these sources, which I prefer not to report for courtesy reasons (but you can find them pretty easily), have in common an (old) statement from the European institution itself. Few lines that provide some additional scant details about the phantom cyber attack and also outline an extortion attempt:... Read More

16-31 July 2015 Cyber Attacks Timeline

The dog days are finally here, and the second timeline of July could not miss the appointment (first part here).... Read More

Researchers Show How to Remotely Hack a Jeep

You are driving your Cherokee Jeep like you normally do, you tune the radio on your favorite station, and you suddenly realize there is something completely wrong. The car does not follow your orders anymore: the radio tuner ignores your settings and chooses the radio station on its own, the windshield wipers turn on and, even worse, the car decides autonomously when steering, accelerating or braking.... Read More

1-15 July 2015 Cyber Attacks Timeline

This first half of July will be long remembered for the Infosec Professionals: undoubtedly the dramatic Hacking Team leak has characterized this fortnight and has written one of the most controversial pages of the Infosec Annals.  Security researchers and activists are still digging into the trove of documents (and 0-days) siphoned from the Italian company, and this story, that is unveiling new details every day, is far from being completed.... Read More

June 2015 Cyber Attacks Statistics

It’s time to aggregate the data collected from the Cyber Attacks Timelines of June (part I and part II) into statistics.
... Read More

The Same Attacker Behind the Breaches Against Hacking Team and Gamma International

The alleged author of the huge breach against Hacking Team in which 400 Gb of data were leaked, has come out of stealth, posting a series of tweets in which he claimed responsibility for the attack:... Read More