Cyber Crime

Android Acecard banking trojan asks users for selfie with an ID card

Experts discovered a new variant of the Android Acecard banking trojan that asks victims to take a selfie while they…

9 years ago

Exclusive – ELF Linux/NyaDrop, a new IoT threat in the wild

Exclusive: interview made by @unixfreaxjp of MalwareMustDie for Security Affairs about the Linux/NyaDrop. The latest details about this new dangerous…

9 years ago

33 million records exposed after the Evony data breach

The website and the forum of the Evony gaming company were hacked this summer and as a result 33 Million…

9 years ago

SSHowDowN Proxy attacks – A 12-Year-Old SSH bug exposes more than 2M IoT Devices

Akamai Technologies revealed that hackers are exploiting a 12-year-old bug in OpenSSH to hack into millions of IoT devices with…

9 years ago

Attackers are exploiting a recently patched high-severity DoS flaw in BIND

Attackers are exploiting a recently patched high-severity DoS flaw, tracked as CVE-2016-2776, in the in the popular DNS software in…

9 years ago

Bitcoin Wallet Blockchain.info went down due to a DNS Hijacking

 Blockchain.info, the world's most popular Bitcoin wallet and Block Explorer service went down this week due to a DNS Hijacking…

9 years ago

Vera Bradley retail chain notifies customers of data breach

The American retail chain Vera Bradley announced that hackers have stolen a yet undetermined number of payment card data from…

9 years ago

Experts observed several malvertising campaigns deliver Cerber 4.0

Cerber 4.0 is the latest variant of the Cerber ransomware family that is becoming even more common in the malvertising…

9 years ago

DXXD Ransomware, displays legal notice and encrypts files on unmapped network shares

The DXXD ransomware specifically targets servers and is able to encrypt files on network shares even if they haven’t been…

9 years ago

Patch Tuesday fixes four Microsoft zero-day flaws exploited in the wild

Microsoft October security bulletins patch tens of vulnerabilities, including four Microsoft zero-day vulnerabilities that have been exploited in the wild.…

9 years ago

This website uses cookies.