Cyber Crime

FBI website hacked by CyberZeist and data leaked online

The notorious black hat hacker CyberZeist (@cyberzeist2) has broken into the FBI website FBI.gov and leaked data on Pastebin. The…

9 years ago

Hacker held open MongoDB databases for ransom

A mysterious hacker is breaking into unprotected MongoDB databases, stealing their content, and asking for a ransom to return the…

9 years ago

Sundown Exploit Kit now leverages on the steganography

A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security…

9 years ago

The OSCE organization was victim of a major cyber attack

The Organization for Security and Co-operation in Europe (OSCE) confirmed to have suffered suffer a "major" cyber attack. Hackers targeted…

9 years ago

InterContinental Hotels investigating a possible card breach

The company InterContinental Hotels Group (IHG) confirmed an ongoing investigation of alleged card breach at some of its properties. The…

9 years ago

Dreaded KillDisk Malware now includes Ransomware abilities

Researchers at security firm CyberX have recently discovered a variant of the KillDisk malware that also implements ransomware features. KillDisk is…

9 years ago

Android Switcher Trojan targets routers changing DNS settings

Security experts from Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers in order to change…

9 years ago

The number of ICS Attacks continues to increase worldwide

According to data provided by IBM Managed Security Services, the number of ICS attacks in 2016 continues to increase worldwide.…

9 years ago

Hacked Sony Music Entertainment account tweeted about Britney Spears’s Death

Hackers compromised the Sony Music Entertainment Twitter account and posted the messages on Britney Spears's Death. Experts blame OurMine crew.…

9 years ago

Malware distribution tactics used in phishing campaign

Experts from Proofpoint discovered a new phishing campaign designed to steal banking data leveraging tactics associated with malware distribution. Security…

9 years ago

This website uses cookies.