Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security have developed a collection of open source tools and disclosed techniques that can be useful in identifying large Twitter botnet. The experts developed the tools […]
Group-IB researchers have investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Security experts from Group-IB, an international company specializing in preventing cyberattacks and developing information security solutions, has investigated user data leaks from cryptocurrency exchanges and has analyzed the nature of these incidents. Within a year, the number […]
A security researcher discovered a new crypto mining worm dubbed ZombieBoy that leverages several exploits to evade detection. The security researcher James Quinn has spotted a new strain of crypto mining worm dubbed ZombieBoy that appears to be very profitable and leverages several exploits to evade detection. The expert called this new malware ZombieBoy because it uses a tool called […]
Security experts from Symantec are warning of tech support scams abusing Call Optimization Services to insert phone numbers. Crooks are improving their tech support scams by using Call Optimization Services that are commonly used in legitimate call center operations to perform: Tracking the source of inbound calls Creation and management of phone numbers Call load balancing Call forwarding […]
A virus has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories on Friday night, the plants where Apple produces its devices A malware has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories on Friday night, the iPhone chipmaker plans. TSMC is the world’s biggest contract manufacturer of chips for tech giants, including Apple […]
Data breaches are costly for businesses that expterience them, this data fuel the black markets and sometime are offered to complanies as legitimate data. Data breaches are extraordinarily costly for businesses that experience them, both concerning reputational damage and money spent to repair the issues associated with those fiascos. And, on the consumer side of […]
Industrial sector hit by a surgical spear-phishing campaign aimed at installing legitimate remote administration software on victims’ machines. Attackers carried out a spear-phishing campaign against entities in the industrial sector, the messages disguised as commercial offers where used by attackers to deliver a legitimate remote administration software on victims’ systems (TeamViewer or Remote Manipulator System/Remote […]
Ten years ago someone breached into a server of the Yale University, but because the intrusion happened nearly ten years ago there is much more information about how it occurred. After ten years, Yale University revealed a security breach that exposed an archive containing personal information of 119,000 people. Hackers breached into the database of the famous […]
The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study. The researchers that have tracked Bitcoin addresses managed by the crime gang discovered that crooks behind the SamSam ransomware had extorted nearly $6 million from the victims since December […]
New revelations on the attack against COSCO confirm it was worse than initially thought, the ransomware spread beyond the US network. Chinese shipping giant COSCO recently suffered a ransomware attack that disrupted some systems of the company in the United States. The shipping company quickly isolates the systems to avoid propagation to other regions and started […]