Cyber Crime

Experts at RedSocks analyzed the massive WannaCry Ransomware attackExperts at RedSocks analyzed the massive WannaCry Ransomware attack

Experts at RedSocks analyzed the massive WannaCry Ransomware attack

Currently we are seeing a large scale WannaCry ransomware outbreak. This ransomware outbreak is more devastating than others because it spreads…

8 years ago
WannaCry – Microsoft issued emergency patches for Windows XP and Server 2003WannaCry – Microsoft issued emergency patches for Windows XP and Server 2003

WannaCry – Microsoft issued emergency patches for Windows XP and Server 2003

Microsoft issued security patches for Windows XP and Server 2003 in response to the WannaCry ransomware attacks. On Friday, the…

8 years ago
Experts discovered a kill switch to slow the spreading of the WannaCry ransomwareExperts discovered a kill switch to slow the spreading of the WannaCry ransomware

Experts discovered a kill switch to slow the spreading of the WannaCry ransomware

The WannaCry ransomware worm infected systems at organizations and critical infrastructure across at least 74 countries leveraging NSA exploits. Experts…

8 years ago
Massive ransomware attack leveraging on WannaCry hits systems in dozens of countriesMassive ransomware attack leveraging on WannaCry hits systems in dozens of countries

Massive ransomware attack leveraging on WannaCry hits systems in dozens of countries

WannaCry ransomware attack is infecting systems in dozens of countries leveraging NSA exploit codes leaked by the hacker group Shadow…

8 years ago
Hackers are selling fake diplomas and certifications in the dark webHackers are selling fake diplomas and certifications in the dark web

Hackers are selling fake diplomas and certifications in the dark web

According to Israeli threat intelligence firm Sixgill, certifications and fake diplomas are very cheap and easy to buy in the…

8 years ago
The Rakos botnet – Exploring a P2P Transient Botnet From Discovery to EnumerationThe Rakos botnet – Exploring a P2P Transient Botnet From Discovery to Enumeration

The Rakos botnet – Exploring a P2P Transient Botnet From Discovery to Enumeration

The Rakos botnet - Exploring a P2P Transient Botnet From Discovery to Enumeration. 1. Introduction We recently deployed a high…

8 years ago
Microsoft Patch Tuesday updates for May 2017 fix Zero Days exploited by Russian APT groupsMicrosoft Patch Tuesday updates for May 2017 fix Zero Days exploited by Russian APT groups

Microsoft Patch Tuesday updates for May 2017 fix Zero Days exploited by Russian APT groups

Microsoft Patch Tuesday for May 2017 address tens security vulnerabilities, including a number of zero-day flaws exploited by Russian APT…

8 years ago
The Supply chain of the HandBrake Mac software compromised to spread Proton malwareThe Supply chain of the HandBrake Mac software compromised to spread Proton malware

The Supply chain of the HandBrake Mac software compromised to spread Proton malware

Maintainers of the HandBrake video transcoder are warning Mac users who recently downloaded the software that they may have been…

8 years ago
Android’s Vampire Bat Apps are listening to your life through ultrasonic beaconsAndroid’s Vampire Bat Apps are listening to your life through ultrasonic beacons

Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons

Researchers at Technische Universitat Braunschweig published a study on 200+ Android mobile apps that are listening to your life through…

8 years ago
Operation WilySupply – Software remote update channel of the supply chain exploited as attack vectorOperation WilySupply – Software remote update channel of the supply chain exploited as attack vector

Operation WilySupply – Software remote update channel of the supply chain exploited as attack vector

Microsoft has recently uncovered an attack dubbed Operation WilySupply that leveraged the update mechanism of an unnamed software editing tool to compromise…

8 years ago