Cyber Crime

Linux.PNScan Trojan is back to compromise routers and install backdoors

The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to…

8 years ago

ATMs in Thailand hacked by a cybercrime gang linked to Taiwan theft

Thailand - A gang of foreign criminals stole millions of baht by hacking ATMs in the country. The gang is…

8 years ago

The Equation Group’s exploit ExtraBacon works on newer Cisco ASA

Security experts have improved the ExtraBacon exploit included in the NSA Equation Group arsenal to hack newer version of CISCO…

8 years ago

Europol Operation Daylight, arrested 75 suspects for sharing child sex images

The Europol coordinated the Operation Daylight against criminals that were sharing child sex images on the internet, 75 suspects have…

8 years ago

Linux.Rex.1, a new Linux Trojan the creates a P2P Botnet

Security researchers discovered a new Linux Trojan dubbed Linux.Rex.1 that is capable of self-spreading and create a peer-to-peer botnet. A…

8 years ago

IoT – Shocking : How your home sockets could aid in Cyber attacks

IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I…

8 years ago

Epic Games forums hacked again, thousands of account logins stolen

The Epic Games forums hacked again, more than 800,000 logins accounts have been stolen, with more than half a million…

8 years ago

New Gozi Campaigns Target Global Brands with sophisticated features

Researchers from Buguroo discovered new Gozi campaigns using new techniques that targeted many banks and financial services worldwide. The Gozi malware was…

8 years ago

Twitter suspended 235,000 accounts belonging to the ISIS in 6 months

Twitter announced it has shut down 360,000 terrorist-related accounts since last year, Daesh traffic on its platform has plummeted by…

8 years ago

A new Brazilian banking Trojan leverages on PowerShell

According to Kaspersky experts Brazilian crooks have made an important addition to their malware leveraging on the PowerShell. Security experts…

8 years ago

This website uses cookies.