Cyber Crime

Iron cybercrime group uses a new Backdoor based on HackingTeam’s RCS surveillance sw

Security experts at security firm Intezer have recently discovered backdoor, associated with the operation of the Iron cybercrime group, that…

8 years ago

Imperva’s research shows 75% of open Redis servers are infected

According to the security experts at Imperva firm, three open Redis servers out of four are infected with malware. The discovery…

8 years ago

Crooks included the code for CVE-2018-8174 IE Zero-Day in the RIG Exploit Kit

Cyber criminals recently added the code for the CVE-2018-8174 Internet Explorer zero-day vulnerability to the infamous RIG exploit kit. Crooks recently added…

8 years ago

Crooks expand the original Mirai botnet code base with new capabilities and improvements

Cybercriminals continue to improve the infamous Mirai botnet by adding new exploits and functionalities, experts warn new dangerous variant will appear…

8 years ago

At least 90,000 Canadian bank customers may have been affected by two data breach

On Monday, Two Canada’s five largest banks, the Bank of Montreal (BMO) and Simplii Financial, informed their customers they are investigating a…

8 years ago

New Banking Trojan MnuBot uses SQL Server for Command and Control

Researchers at IBM X-Force Research team discovered a new Delphi-based banking Trojan dubbed MnuBot that leverages Microsoft SQL Server for communication with the…

8 years ago

Hacker stole $1.35 million from cryptocurrency startup Taylor

Hacker stole $1.3 million from cryptocurrency startup Taylor, the development team will stop the launch of its trading app that was…

8 years ago

The Cobalt Hacking crew is still active even after the arrest of its leader

Group-IB has released a new report on Cobalt group’s attacks against banks and financial sector organizations worldwide after the arrest of…

8 years ago

BackSwap Trojan implements new techniques to steal funds from your bank account

Security experts at ESET have spotted a new strain of banking trojan named BackSwap Trojan that implements new techniques to…

8 years ago

MalHide Malware uses the compromised system as an eMail relay

The cybersecurity experts Marco Ramilli analyzed a new sample of malware dubbed MalHide that implements a quite new attack path to…

8 years ago

This website uses cookies.