Home / Early Warning / Cybersecurity Highlights
Subscribe to CERTSI - Cybersecurity Highlights RSS

Cybersecurity Highlights

This section registers the most relevant incidents or public events related to the cybersecurity and information and communication technologies (ICT), in a way that a chronological history of them is available, together with their main links, references and information sources.

Dyre Wolf Campaign

04/02/2015
IBM researchers have reported a campaign related to the Dyre trojan, and they have dubbed it Dyre Wolf. Through this campaign, criminal organizations would have managed to steal between $500,000...

White House a issues cybersecurity executive order

04/01/2015
The President of the United States, Barack Obama, has issued and executive order that allows the Treasury Department to impose financially punitive sanctions against cyber hackers who impose a...
Tags: 

Bar Mitzvah: attacking RC4 to compromise SSL/TLS

03/26/2015
A new attack against a weak RC4 functions allows attacker to decipher data into a ciphered SSL/TLS connection. Unlike the previous attacks involving SSL, this does not need an active connection and...

Unauthorized certificates from CNNIC for Google domains

03/20/2015
Google has detected several unauthorized digital certificates issued for Google domains. These certificates were issued by an intermediary authority controlled by MCS Holdings, whose certificate...

PoSeidon: a new malware for PoS

03/20/2015
Cisco has published the details of a new malware aimed at exfiltrating information from Points of Sale (PoS). Being based on the same techniques as Zeus, this new malware has been named PoSeidon...

Rowhammer: elevación de privilegios manipulando la DRAM

03/09/2015
Researchers from Google's Project Zero have been able to use the effect known as rowhammer in DRAM memories in order to escalate privileges in the sandboxing system NaCl and in Linux systems. This...

Pages