Cyber Crime

Asian Nation-State hackers use fileless RAT for their hacking campaignAsian Nation-State hackers use fileless RAT for their hacking campaign

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security…

9 years ago
Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than…

9 years ago
The Australian government presents its Cyber Security StrategyThe Australian government presents its Cyber Security Strategy

The Australian government presents its Cyber Security Strategy

The Australian government has presented his Cyber Security Strategy and admitted the ability to conduct offensive cyber operations. The Australian…

9 years ago
A new strain of Teslacrypt implements sophisticated evasionA new strain of Teslacrypt implements sophisticated evasion

A new strain of Teslacrypt implements sophisticated evasion

The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types.…

9 years ago
Multigrain PoS malware exfiltrates stolen card data over DNSMultigrain PoS malware exfiltrates stolen card data over DNS

Multigrain PoS malware exfiltrates stolen card data over DNS

FireEye has discovered a new strain of POS malware dubbed Multigrain that steals card data from point-of-sale systems and exfiltrates…

9 years ago
The Four Element Sword, weaponized document builder used in APT AttacksThe Four Element Sword, weaponized document builder used in APT Attacks

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security…

9 years ago
The CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the IcebergThe CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the Iceberg

The CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the Iceberg

The US intelligence is massively expanding in Social Media surveillance pushing new technologies, including artificial intelligence for data mining In-Q-Tel,…

9 years ago
IBM warns a spike in the number of PHP C99 Webshell AttacksIBM warns a spike in the number of PHP C99 Webshell Attacks

IBM warns a spike in the number of PHP C99 Webshell Attacks

IBM Security has warned the WordPress community about a spike in the number of attacks leveraging a specific variant of…

9 years ago
PhineasFisher explained how he breached the Hacking TeamPhineasFisher explained how he breached the Hacking Team

PhineasFisher explained how he breached the Hacking Team

The hacker PhineasFisher published a detailed explanation of how he has hacked the Italian surveillance firm Hacking Team. In July…

9 years ago
Lottery security director hacked random-number generator to rig lotteriesLottery security director hacked random-number generator to rig lotteries

Lottery security director hacked random-number generator to rig lotteries

New evidence collected by prosecutors shows lottery machines were rigged to generate predictable numbers on specific days of the year.…

9 years ago