Cyber Crime

Businesses pay $100k to alleged Armada Collective to avoid DDoSBusinesses pay $100k to alleged Armada Collective to avoid DDoS

Businesses pay $100k to alleged Armada Collective to avoid DDoS

Businesses have already paid more than $100,000 to DDoS extortionists who claim to be the dreaded Armada Collective, but that…

9 years ago
Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and TowelrootDogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

Blue Coat spotted a new ransomware-based campaign serving the Dogspectus malware. Crooks combined a Hacking Team exploit and the Towelroot…

9 years ago
GozNym Trojan even more sophisticated with a singular redirection mechanismGozNym Trojan even more sophisticated with a singular redirection mechanism

GozNym Trojan even more sophisticated with a singular redirection mechanism

The cybercriminals behind the GozNym Trojan have started targeting users in European countries with a new singular redirection mechanism. Last…

9 years ago
Bangladesh Bank heist gang used a malware and could strike againBangladesh Bank heist gang used a malware and could strike again

Bangladesh Bank heist gang used a malware and could strike again

A report published by the BAE firm reveals that criminals who stole $101 million from Bangladesh bank used a malware…

9 years ago
Bogus social button plugin redirects to Angler Exploit KitBogus social button plugin redirects to Angler Exploit Kit

Bogus social button plugin redirects to Angler Exploit Kit

Experts at Malwarebytes observed a new attack pattern that relies on fake social button plugin that redirects visitors to Angler…

9 years ago
Dutch police seize the Ennetcom encrypted communication networkDutch police seize the Ennetcom encrypted communication network

Dutch police seize the Ennetcom encrypted communication network

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users.…

9 years ago
Bangladesh Bank hacked due to inadequate defense systemsBangladesh Bank hacked due to inadequate defense systems

Bangladesh Bank hacked due to inadequate defense systems

Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches…

9 years ago
JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransomJIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

JIGSAW ransomware slowly deletes your files as you shilly-shally to pay the ransom

A new threat is appeared in the wild it is the JIGSAW ransomware that slowly deletes your files as you…

9 years ago
Asian Nation-State hackers use fileless RAT for their hacking campaignAsian Nation-State hackers use fileless RAT for their hacking campaign

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

9 years ago
Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

9 years ago