Cyber Crime

Evilnum Group targets European and British fintech companies

A threat actor tracked as Evilnum targeted financial technology companies, mainly the British and European ones, ESET researchers reported. Evilnum…

6 years ago

Joker malware apps bypassed Google’s Play Store security checks

Check Point research discovered that the Joker (aka Bread) Android malware once again has bypassed protections implemented by Google for…

6 years ago

15 billion credentials available in the cybercrime marketplaces

More than 15 billion username and passwords are available on cybercrime marketplaces, including over 5 billion unique credentials, states the…

6 years ago

DOJ indicts Fxmsp hacker for selling access to hacked businesses

The US Department of Justice has indicted a hacker named Fxmsp for hacking over three hundred organizations worldwide and selling…

6 years ago

Malicious app in Google Play used to deliver Cerberus Banking Trojan

Experts found a tainted app in the Google Play store that was downloaded by more than 10,000 users and that…

6 years ago

New release of Lampion trojan spreads in Portugal with some improvements on the VBS downloader

Expert spotted a new release of the Lampion trojan banker that was launched with fresh improvements in the way the…

6 years ago

Authors of Purple Fox EK adds 2 Microsoft exploits

The authors of the Purple Fox EK have integrated two new exploits for Microsoft vulnerabilities to the Purple Fox EK.…

6 years ago

Ransomware infected systems at Xchanging, a DXC subsidiary

Systems at Xchanging, a subsidiary of Global IT services and solutions provider DXC Technology was hit by ransomware over the…

6 years ago

Former Yahoo! employee who accessed 6K accounts avoids jail

A former Yahoo! employee who hacked into the accounts of thousands of users was sentenced to five years of probation. In September…

6 years ago

Snake Ransomware isolates infected Systems before encrypting files

Experts spotted recent samples of the Snake ransomware that were isolating the infected systems while encrypting files to avoid interference. Experts from…

6 years ago

This website uses cookies.