Cyber Crime

Zombinder APK binding service used in multiple malware attacks

Zombinder is a third-party service on darknet used to embed malicious payloads in legitimate Android applications. While investigating a new…

3 years ago

New Go-based botnet Zerobot exploits dozens of flaws

Researchers discovered a new Go-based botnet called Zerobot that exploits two dozen security vulnerabilities IoT devices. Fortinet FortiGuard Labs researchers have discovered…

3 years ago

Ransomware Toolkit Cryptonite turning into an accidental wiper

Researchers spotted a version of the open-source ransomware toolkit Cryptonite that doesn't support decryption capabilities. Fortinet researchers discovered a sample of…

3 years ago

Crook sentenced to 18 months for stealing $20M in SIM swapping attack

Nicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more than $20 million in a…

3 years ago

French hospital cancels operations after a ransomware attack

A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend.…

3 years ago

Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web

Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. "In the Box" dark…

3 years ago

US DHS Cyber Safety Board will review Lapsus$ gang’s operations

US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies.…

3 years ago

Cuba Ransomware received over $60M in Ransom payments as of August 2022

Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of…

3 years ago

New Go-based Redigo malware targets Redis servers

Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm…

3 years ago

Threat actors are offering access to corporate networks via unauthorized Fortinet VPN access

Cyble observed Initial Access Brokers (IABs) offering access to enterprise networks compromised via a critical flaw in Fortinet products. Researchers at…

3 years ago

This website uses cookies.