Cyber Crime

Erbium info-stealing malware, a new option in the threat landscape

The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games. Threat actors behind…

3 years ago

Exmatter exfiltration tool used to implement new extortion tactics

Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality. The data…

3 years ago

Ukraine: SSU dismantled cyber gang that stole 30 million accounts

The cyber department of Ukraine 's Security Service (SSU) dismantled a gang that stole accounts of about 30 million individuals.…

3 years ago

London Police arrested a teen suspected to be behind Uber, Rockstar Games breaches

The City of London Police this week announced the arrest of a 17-year-old teenager on suspicion of hacking. Is he…

3 years ago

Surge in Magento 2 template attacks exploiting the CVE-2022-24086 flaw

Sansec researchers warn of a surge in hacking attempts targeting a critical Magento 2 vulnerability tracked as CVE-2022-24086. Sansec researchers…

3 years ago

A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder

A disgruntled developer seems to be responsible for the leak of the builder for the latest encryptor of the LockBit…

3 years ago

Hackers stole $160 Million from Crypto market maker Wintermute

Threat actors have stolen around $160 million worth of digital assets worth from crypto trading firm Wintermute. Malicious actors continue to…

3 years ago

Imperva blocked a record DDoS attack with 25.3 billion requests

Cybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests.…

3 years ago

Uber believes that the LAPSUS$ gang is behind the recent attack

Uber disclosed additional details about the security breach, the company blames a threat actor allegedly affiliated with the LAPSUS$ hacking…

3 years ago

Analyzing IP Addresses to Prevent Fraud for Enterprises

How can businesses protect themselves from fraudulent activities by examining IP addresses? The police would track burglars if they left…

3 years ago

This website uses cookies.